Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 14:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-07-06_746cc061343d301d6940348023eed577_mafia.exe
Resource
win7-20240220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-07-06_746cc061343d301d6940348023eed577_mafia.exe
Resource
win10v2004-20240704-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-07-06_746cc061343d301d6940348023eed577_mafia.exe
-
Size
536KB
-
MD5
746cc061343d301d6940348023eed577
-
SHA1
7fa1adc53c7e1f2c9b0943cfd612591b220d357b
-
SHA256
b3ea21db7b916e59ccdb1a5c75733987b052ab99f1ab14f2eea55afc71a106be
-
SHA512
8057cfd2f881c741b06c00ebdf8b3c345b85dbce4ac96153f44893629db2feb6724db397c69c6eb030941ea2c9754a12c63a3448ead628fe19bd42a2ab2e78e7
-
SSDEEP
12288:wU5rCOTeiU7xACy023uIdmSSmgznD4ugDIZxVJ0ZT9:wUQOJU7xACmeIdivaIRJ0ZT9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2252 1D60.tmp 3024 1DFC.tmp 2660 1EB7.tmp 2516 1F24.tmp 2708 1FC0.tmp 2588 206C.tmp 2392 2108.tmp 2296 2175.tmp 2884 2230.tmp 2368 22DC.tmp 2632 2359.tmp 1864 23D6.tmp 1580 2472.tmp 2276 251D.tmp 2156 25AA.tmp 1612 2607.tmp 1448 26C2.tmp 1692 2730.tmp 2756 27DB.tmp 2480 2848.tmp 2100 2932.tmp 2568 29BF.tmp 1436 2A4B.tmp 2728 2AB8.tmp 2364 2B16.tmp 3032 2B64.tmp 1672 2BC2.tmp 3064 2C2F.tmp 1784 2C7D.tmp 1292 2CCB.tmp 1748 2D28.tmp 1192 2D76.tmp 3044 2DD4.tmp 1344 2E32.tmp 1684 2E9F.tmp 620 2F0C.tmp 1128 2F79.tmp 896 2FC7.tmp 1676 3073.tmp 1532 30D0.tmp 1668 314D.tmp 2952 319B.tmp 2224 31E9.tmp 3024 3247.tmp 2660 3295.tmp 2220 32E3.tmp 2796 3321.tmp 2704 336F.tmp 2448 33BD.tmp 2464 340B.tmp 2512 344A.tmp 2344 3498.tmp 1356 34E6.tmp 1516 3534.tmp 2368 3582.tmp 2640 35DF.tmp 400 362D.tmp 2124 368B.tmp 1580 36D9.tmp 816 3727.tmp 1608 3765.tmp 2156 37B3.tmp 1360 3801.tmp 1416 384F.tmp -
Loads dropped DLL 64 IoCs
pid Process 2860 2024-07-06_746cc061343d301d6940348023eed577_mafia.exe 2252 1D60.tmp 3024 1DFC.tmp 2660 1EB7.tmp 2516 1F24.tmp 2708 1FC0.tmp 2588 206C.tmp 2392 2108.tmp 2296 2175.tmp 2884 2230.tmp 2368 22DC.tmp 2632 2359.tmp 1864 23D6.tmp 1580 2472.tmp 2276 251D.tmp 2156 25AA.tmp 1612 2607.tmp 1448 26C2.tmp 1692 2730.tmp 2756 27DB.tmp 2480 2848.tmp 2100 2932.tmp 2568 29BF.tmp 1436 2A4B.tmp 2728 2AB8.tmp 2364 2B16.tmp 3032 2B64.tmp 1672 2BC2.tmp 3064 2C2F.tmp 1784 2C7D.tmp 1292 2CCB.tmp 1748 2D28.tmp 1192 2D76.tmp 3044 2DD4.tmp 1344 2E32.tmp 1684 2E9F.tmp 620 2F0C.tmp 1128 2F79.tmp 896 2FC7.tmp 1676 3073.tmp 1532 30D0.tmp 1668 314D.tmp 2952 319B.tmp 2224 31E9.tmp 3024 3247.tmp 2660 3295.tmp 2220 32E3.tmp 2796 3321.tmp 2704 336F.tmp 2448 33BD.tmp 2464 340B.tmp 2512 344A.tmp 2344 3498.tmp 1356 34E6.tmp 1516 3534.tmp 2368 3582.tmp 2640 35DF.tmp 400 362D.tmp 2124 368B.tmp 1580 36D9.tmp 816 3727.tmp 1608 3765.tmp 2156 37B3.tmp 1360 3801.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2252 2860 2024-07-06_746cc061343d301d6940348023eed577_mafia.exe 28 PID 2860 wrote to memory of 2252 2860 2024-07-06_746cc061343d301d6940348023eed577_mafia.exe 28 PID 2860 wrote to memory of 2252 2860 2024-07-06_746cc061343d301d6940348023eed577_mafia.exe 28 PID 2860 wrote to memory of 2252 2860 2024-07-06_746cc061343d301d6940348023eed577_mafia.exe 28 PID 2252 wrote to memory of 3024 2252 1D60.tmp 29 PID 2252 wrote to memory of 3024 2252 1D60.tmp 29 PID 2252 wrote to memory of 3024 2252 1D60.tmp 29 PID 2252 wrote to memory of 3024 2252 1D60.tmp 29 PID 3024 wrote to memory of 2660 3024 1DFC.tmp 30 PID 3024 wrote to memory of 2660 3024 1DFC.tmp 30 PID 3024 wrote to memory of 2660 3024 1DFC.tmp 30 PID 3024 wrote to memory of 2660 3024 1DFC.tmp 30 PID 2660 wrote to memory of 2516 2660 1EB7.tmp 31 PID 2660 wrote to memory of 2516 2660 1EB7.tmp 31 PID 2660 wrote to memory of 2516 2660 1EB7.tmp 31 PID 2660 wrote to memory of 2516 2660 1EB7.tmp 31 PID 2516 wrote to memory of 2708 2516 1F24.tmp 32 PID 2516 wrote to memory of 2708 2516 1F24.tmp 32 PID 2516 wrote to memory of 2708 2516 1F24.tmp 32 PID 2516 wrote to memory of 2708 2516 1F24.tmp 32 PID 2708 wrote to memory of 2588 2708 1FC0.tmp 33 PID 2708 wrote to memory of 2588 2708 1FC0.tmp 33 PID 2708 wrote to memory of 2588 2708 1FC0.tmp 33 PID 2708 wrote to memory of 2588 2708 1FC0.tmp 33 PID 2588 wrote to memory of 2392 2588 206C.tmp 34 PID 2588 wrote to memory of 2392 2588 206C.tmp 34 PID 2588 wrote to memory of 2392 2588 206C.tmp 34 PID 2588 wrote to memory of 2392 2588 206C.tmp 34 PID 2392 wrote to memory of 2296 2392 2108.tmp 35 PID 2392 wrote to memory of 2296 2392 2108.tmp 35 PID 2392 wrote to memory of 2296 2392 2108.tmp 35 PID 2392 wrote to memory of 2296 2392 2108.tmp 35 PID 2296 wrote to memory of 2884 2296 2175.tmp 36 PID 2296 wrote to memory of 2884 2296 2175.tmp 36 PID 2296 wrote to memory of 2884 2296 2175.tmp 36 PID 2296 wrote to memory of 2884 2296 2175.tmp 36 PID 2884 wrote to memory of 2368 2884 2230.tmp 37 PID 2884 wrote to memory of 2368 2884 2230.tmp 37 PID 2884 wrote to memory of 2368 2884 2230.tmp 37 PID 2884 wrote to memory of 2368 2884 2230.tmp 37 PID 2368 wrote to memory of 2632 2368 22DC.tmp 38 PID 2368 wrote to memory of 2632 2368 22DC.tmp 38 PID 2368 wrote to memory of 2632 2368 22DC.tmp 38 PID 2368 wrote to memory of 2632 2368 22DC.tmp 38 PID 2632 wrote to memory of 1864 2632 2359.tmp 39 PID 2632 wrote to memory of 1864 2632 2359.tmp 39 PID 2632 wrote to memory of 1864 2632 2359.tmp 39 PID 2632 wrote to memory of 1864 2632 2359.tmp 39 PID 1864 wrote to memory of 1580 1864 23D6.tmp 40 PID 1864 wrote to memory of 1580 1864 23D6.tmp 40 PID 1864 wrote to memory of 1580 1864 23D6.tmp 40 PID 1864 wrote to memory of 1580 1864 23D6.tmp 40 PID 1580 wrote to memory of 2276 1580 2472.tmp 41 PID 1580 wrote to memory of 2276 1580 2472.tmp 41 PID 1580 wrote to memory of 2276 1580 2472.tmp 41 PID 1580 wrote to memory of 2276 1580 2472.tmp 41 PID 2276 wrote to memory of 2156 2276 251D.tmp 42 PID 2276 wrote to memory of 2156 2276 251D.tmp 42 PID 2276 wrote to memory of 2156 2276 251D.tmp 42 PID 2276 wrote to memory of 2156 2276 251D.tmp 42 PID 2156 wrote to memory of 1612 2156 25AA.tmp 43 PID 2156 wrote to memory of 1612 2156 25AA.tmp 43 PID 2156 wrote to memory of 1612 2156 25AA.tmp 43 PID 2156 wrote to memory of 1612 2156 25AA.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_746cc061343d301d6940348023eed577_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-06_746cc061343d301d6940348023eed577_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\1D60.tmp"C:\Users\Admin\AppData\Local\Temp\1D60.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\1F24.tmp"C:\Users\Admin\AppData\Local\Temp\1F24.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\206C.tmp"C:\Users\Admin\AppData\Local\Temp\206C.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\2175.tmp"C:\Users\Admin\AppData\Local\Temp\2175.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\2230.tmp"C:\Users\Admin\AppData\Local\Temp\2230.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\22DC.tmp"C:\Users\Admin\AppData\Local\Temp\22DC.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\2359.tmp"C:\Users\Admin\AppData\Local\Temp\2359.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\23D6.tmp"C:\Users\Admin\AppData\Local\Temp\23D6.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\2472.tmp"C:\Users\Admin\AppData\Local\Temp\2472.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\251D.tmp"C:\Users\Admin\AppData\Local\Temp\251D.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\25AA.tmp"C:\Users\Admin\AppData\Local\Temp\25AA.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\2607.tmp"C:\Users\Admin\AppData\Local\Temp\2607.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\26C2.tmp"C:\Users\Admin\AppData\Local\Temp\26C2.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\2730.tmp"C:\Users\Admin\AppData\Local\Temp\2730.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\27DB.tmp"C:\Users\Admin\AppData\Local\Temp\27DB.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\2848.tmp"C:\Users\Admin\AppData\Local\Temp\2848.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\2B16.tmp"C:\Users\Admin\AppData\Local\Temp\2B16.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\2B64.tmp"C:\Users\Admin\AppData\Local\Temp\2B64.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\2D28.tmp"C:\Users\Admin\AppData\Local\Temp\2D28.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\2D76.tmp"C:\Users\Admin\AppData\Local\Temp\2D76.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"C:\Users\Admin\AppData\Local\Temp\2DD4.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620 -
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"C:\Users\Admin\AppData\Local\Temp\2FC7.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\30D0.tmp"C:\Users\Admin\AppData\Local\Temp\30D0.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3295.tmp"C:\Users\Admin\AppData\Local\Temp\3295.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\32E3.tmp"C:\Users\Admin\AppData\Local\Temp\32E3.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\336F.tmp"C:\Users\Admin\AppData\Local\Temp\336F.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\340B.tmp"C:\Users\Admin\AppData\Local\Temp\340B.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\344A.tmp"C:\Users\Admin\AppData\Local\Temp\344A.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\34E6.tmp"C:\Users\Admin\AppData\Local\Temp\34E6.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\35DF.tmp"C:\Users\Admin\AppData\Local\Temp\35DF.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\362D.tmp"C:\Users\Admin\AppData\Local\Temp\362D.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:400 -
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\36D9.tmp"C:\Users\Admin\AppData\Local\Temp\36D9.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3727.tmp"C:\Users\Admin\AppData\Local\Temp\3727.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:816 -
C:\Users\Admin\AppData\Local\Temp\3765.tmp"C:\Users\Admin\AppData\Local\Temp\3765.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\37B3.tmp"C:\Users\Admin\AppData\Local\Temp\37B3.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\384F.tmp"C:\Users\Admin\AppData\Local\Temp\384F.tmp"65⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\388E.tmp"C:\Users\Admin\AppData\Local\Temp\388E.tmp"66⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\38DC.tmp"C:\Users\Admin\AppData\Local\Temp\38DC.tmp"67⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\392A.tmp"C:\Users\Admin\AppData\Local\Temp\392A.tmp"68⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3987.tmp"C:\Users\Admin\AppData\Local\Temp\3987.tmp"69⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"70⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\3A23.tmp"C:\Users\Admin\AppData\Local\Temp\3A23.tmp"71⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\3A71.tmp"C:\Users\Admin\AppData\Local\Temp\3A71.tmp"72⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\3ABF.tmp"C:\Users\Admin\AppData\Local\Temp\3ABF.tmp"73⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"74⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"75⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"C:\Users\Admin\AppData\Local\Temp\3B9A.tmp"76⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"77⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"78⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\3C74.tmp"C:\Users\Admin\AppData\Local\Temp\3C74.tmp"79⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\3CD2.tmp"C:\Users\Admin\AppData\Local\Temp\3CD2.tmp"80⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\3D20.tmp"C:\Users\Admin\AppData\Local\Temp\3D20.tmp"81⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"82⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\3DCB.tmp"C:\Users\Admin\AppData\Local\Temp\3DCB.tmp"83⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\3E0A.tmp"C:\Users\Admin\AppData\Local\Temp\3E0A.tmp"84⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3E48.tmp"C:\Users\Admin\AppData\Local\Temp\3E48.tmp"85⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3E86.tmp"C:\Users\Admin\AppData\Local\Temp\3E86.tmp"86⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"87⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp"88⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3F51.tmp"C:\Users\Admin\AppData\Local\Temp\3F51.tmp"89⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\3F90.tmp"C:\Users\Admin\AppData\Local\Temp\3F90.tmp"90⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3FCE.tmp"C:\Users\Admin\AppData\Local\Temp\3FCE.tmp"91⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\401C.tmp"C:\Users\Admin\AppData\Local\Temp\401C.tmp"92⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\405A.tmp"C:\Users\Admin\AppData\Local\Temp\405A.tmp"93⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\40A8.tmp"C:\Users\Admin\AppData\Local\Temp\40A8.tmp"94⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\4106.tmp"C:\Users\Admin\AppData\Local\Temp\4106.tmp"95⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\4154.tmp"C:\Users\Admin\AppData\Local\Temp\4154.tmp"96⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\41A2.tmp"C:\Users\Admin\AppData\Local\Temp\41A2.tmp"97⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\41E0.tmp"C:\Users\Admin\AppData\Local\Temp\41E0.tmp"98⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\422E.tmp"C:\Users\Admin\AppData\Local\Temp\422E.tmp"99⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\427C.tmp"C:\Users\Admin\AppData\Local\Temp\427C.tmp"100⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\42BB.tmp"C:\Users\Admin\AppData\Local\Temp\42BB.tmp"101⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\42F9.tmp"C:\Users\Admin\AppData\Local\Temp\42F9.tmp"102⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\4347.tmp"C:\Users\Admin\AppData\Local\Temp\4347.tmp"103⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\4386.tmp"C:\Users\Admin\AppData\Local\Temp\4386.tmp"104⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\43C4.tmp"C:\Users\Admin\AppData\Local\Temp\43C4.tmp"105⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\4412.tmp"C:\Users\Admin\AppData\Local\Temp\4412.tmp"106⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\447F.tmp"C:\Users\Admin\AppData\Local\Temp\447F.tmp"107⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\44DD.tmp"C:\Users\Admin\AppData\Local\Temp\44DD.tmp"108⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\452B.tmp"C:\Users\Admin\AppData\Local\Temp\452B.tmp"109⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\4579.tmp"C:\Users\Admin\AppData\Local\Temp\4579.tmp"110⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\45B7.tmp"C:\Users\Admin\AppData\Local\Temp\45B7.tmp"111⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\45F6.tmp"C:\Users\Admin\AppData\Local\Temp\45F6.tmp"112⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\4644.tmp"C:\Users\Admin\AppData\Local\Temp\4644.tmp"113⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\4692.tmp"C:\Users\Admin\AppData\Local\Temp\4692.tmp"114⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\46D0.tmp"C:\Users\Admin\AppData\Local\Temp\46D0.tmp"115⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\471E.tmp"C:\Users\Admin\AppData\Local\Temp\471E.tmp"116⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\475C.tmp"C:\Users\Admin\AppData\Local\Temp\475C.tmp"117⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\479B.tmp"C:\Users\Admin\AppData\Local\Temp\479B.tmp"118⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\47E9.tmp"C:\Users\Admin\AppData\Local\Temp\47E9.tmp"119⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\4837.tmp"C:\Users\Admin\AppData\Local\Temp\4837.tmp"120⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\4875.tmp"C:\Users\Admin\AppData\Local\Temp\4875.tmp"121⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\48C3.tmp"C:\Users\Admin\AppData\Local\Temp\48C3.tmp"122⤵PID:2912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-