Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 00:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe
-
Size
488KB
-
MD5
530ea3ff96d0abe7c7fcc029f7b61dd6
-
SHA1
ec31566ee250be0a0f682e1f3c79fface1828e0e
-
SHA256
1834a93526f9ea9eb402ca68ac4a28c7fb1eea174c60c66ad7da81674c0da27f
-
SHA512
e8d61fc864d81b86d99bf9897d60bd49cc91139b8685fbc83780e7a2851515a50e41c1189892dbfab70fae34497ee836e4093a6b2066fe9241d167c0696624d7
-
SSDEEP
12288:/U5rCOTeiDrEB7BtVk2jo1kamsPbGEtPNZ:/UQOJDrEBXVkGLahKQPN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2204 4682.tmp 2112 470E.tmp 2784 4846.tmp 2948 48F2.tmp 1884 496F.tmp 2932 4A2A.tmp 2752 4B24.tmp 2748 4BEE.tmp 2576 4CD8.tmp 2648 4DB3.tmp 3036 4E9D.tmp 2552 4F96.tmp 2820 5080.tmp 2884 514B.tmp 3012 5235.tmp 680 5310.tmp 1952 53CB.tmp 1932 54A5.tmp 1756 5560.tmp 320 563B.tmp 744 56F6.tmp 760 57B1.tmp 1864 5956.tmp 2368 5A02.tmp 856 5ABD.tmp 1328 5B3A.tmp 564 5BA7.tmp 1416 5C34.tmp 1412 5CA1.tmp 2892 5D0E.tmp 1936 5D7B.tmp 2280 5DF8.tmp 2056 5E84.tmp 1700 5EE2.tmp 1320 5F5F.tmp 1572 5FDC.tmp 2404 6049.tmp 2452 60B6.tmp 1788 6133.tmp 1920 61B0.tmp 1560 622C.tmp 1352 627A.tmp 2192 62F7.tmp 392 6364.tmp 1716 63E1.tmp 708 643F.tmp 2148 64CB.tmp 3068 6548.tmp 2332 65B5.tmp 2116 6613.tmp 2916 6680.tmp 884 66FD.tmp 2980 677A.tmp 2200 67F7.tmp 2208 6873.tmp 2532 68E1.tmp 2856 696D.tmp 2668 69DA.tmp 2112 6A76.tmp 2784 6AE3.tmp 2708 6B60.tmp 2680 6BDD.tmp 2060 6C4A.tmp 2796 6CA8.tmp -
Loads dropped DLL 64 IoCs
pid Process 1060 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 2204 4682.tmp 2112 470E.tmp 2784 4846.tmp 2948 48F2.tmp 1884 496F.tmp 2932 4A2A.tmp 2752 4B24.tmp 2748 4BEE.tmp 2576 4CD8.tmp 2648 4DB3.tmp 3036 4E9D.tmp 2552 4F96.tmp 2820 5080.tmp 2884 514B.tmp 3012 5235.tmp 680 5310.tmp 1952 53CB.tmp 1932 54A5.tmp 1756 5560.tmp 320 563B.tmp 744 56F6.tmp 760 57B1.tmp 1864 5956.tmp 2368 5A02.tmp 856 5ABD.tmp 1328 5B3A.tmp 564 5BA7.tmp 1416 5C34.tmp 1412 5CA1.tmp 2892 5D0E.tmp 1936 5D7B.tmp 2280 5DF8.tmp 2056 5E84.tmp 1700 5EE2.tmp 1320 5F5F.tmp 1572 5FDC.tmp 2404 6049.tmp 2452 60B6.tmp 1788 6133.tmp 1920 61B0.tmp 1560 622C.tmp 1352 627A.tmp 2192 62F7.tmp 392 6364.tmp 1716 63E1.tmp 708 643F.tmp 2148 64CB.tmp 3068 6548.tmp 2332 65B5.tmp 2116 6613.tmp 2916 6680.tmp 884 66FD.tmp 2980 677A.tmp 2200 67F7.tmp 2208 6873.tmp 2532 68E1.tmp 2856 696D.tmp 2668 69DA.tmp 2112 6A76.tmp 2784 6AE3.tmp 2708 6B60.tmp 2680 6BDD.tmp 2060 6C4A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2204 1060 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 28 PID 1060 wrote to memory of 2204 1060 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 28 PID 1060 wrote to memory of 2204 1060 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 28 PID 1060 wrote to memory of 2204 1060 2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe 28 PID 2204 wrote to memory of 2112 2204 4682.tmp 29 PID 2204 wrote to memory of 2112 2204 4682.tmp 29 PID 2204 wrote to memory of 2112 2204 4682.tmp 29 PID 2204 wrote to memory of 2112 2204 4682.tmp 29 PID 2112 wrote to memory of 2784 2112 470E.tmp 30 PID 2112 wrote to memory of 2784 2112 470E.tmp 30 PID 2112 wrote to memory of 2784 2112 470E.tmp 30 PID 2112 wrote to memory of 2784 2112 470E.tmp 30 PID 2784 wrote to memory of 2948 2784 4846.tmp 31 PID 2784 wrote to memory of 2948 2784 4846.tmp 31 PID 2784 wrote to memory of 2948 2784 4846.tmp 31 PID 2784 wrote to memory of 2948 2784 4846.tmp 31 PID 2948 wrote to memory of 1884 2948 48F2.tmp 32 PID 2948 wrote to memory of 1884 2948 48F2.tmp 32 PID 2948 wrote to memory of 1884 2948 48F2.tmp 32 PID 2948 wrote to memory of 1884 2948 48F2.tmp 32 PID 1884 wrote to memory of 2932 1884 496F.tmp 33 PID 1884 wrote to memory of 2932 1884 496F.tmp 33 PID 1884 wrote to memory of 2932 1884 496F.tmp 33 PID 1884 wrote to memory of 2932 1884 496F.tmp 33 PID 2932 wrote to memory of 2752 2932 4A2A.tmp 34 PID 2932 wrote to memory of 2752 2932 4A2A.tmp 34 PID 2932 wrote to memory of 2752 2932 4A2A.tmp 34 PID 2932 wrote to memory of 2752 2932 4A2A.tmp 34 PID 2752 wrote to memory of 2748 2752 4B24.tmp 35 PID 2752 wrote to memory of 2748 2752 4B24.tmp 35 PID 2752 wrote to memory of 2748 2752 4B24.tmp 35 PID 2752 wrote to memory of 2748 2752 4B24.tmp 35 PID 2748 wrote to memory of 2576 2748 4BEE.tmp 36 PID 2748 wrote to memory of 2576 2748 4BEE.tmp 36 PID 2748 wrote to memory of 2576 2748 4BEE.tmp 36 PID 2748 wrote to memory of 2576 2748 4BEE.tmp 36 PID 2576 wrote to memory of 2648 2576 4CD8.tmp 37 PID 2576 wrote to memory of 2648 2576 4CD8.tmp 37 PID 2576 wrote to memory of 2648 2576 4CD8.tmp 37 PID 2576 wrote to memory of 2648 2576 4CD8.tmp 37 PID 2648 wrote to memory of 3036 2648 4DB3.tmp 38 PID 2648 wrote to memory of 3036 2648 4DB3.tmp 38 PID 2648 wrote to memory of 3036 2648 4DB3.tmp 38 PID 2648 wrote to memory of 3036 2648 4DB3.tmp 38 PID 3036 wrote to memory of 2552 3036 4E9D.tmp 39 PID 3036 wrote to memory of 2552 3036 4E9D.tmp 39 PID 3036 wrote to memory of 2552 3036 4E9D.tmp 39 PID 3036 wrote to memory of 2552 3036 4E9D.tmp 39 PID 2552 wrote to memory of 2820 2552 4F96.tmp 40 PID 2552 wrote to memory of 2820 2552 4F96.tmp 40 PID 2552 wrote to memory of 2820 2552 4F96.tmp 40 PID 2552 wrote to memory of 2820 2552 4F96.tmp 40 PID 2820 wrote to memory of 2884 2820 5080.tmp 41 PID 2820 wrote to memory of 2884 2820 5080.tmp 41 PID 2820 wrote to memory of 2884 2820 5080.tmp 41 PID 2820 wrote to memory of 2884 2820 5080.tmp 41 PID 2884 wrote to memory of 3012 2884 514B.tmp 42 PID 2884 wrote to memory of 3012 2884 514B.tmp 42 PID 2884 wrote to memory of 3012 2884 514B.tmp 42 PID 2884 wrote to memory of 3012 2884 514B.tmp 42 PID 3012 wrote to memory of 680 3012 5235.tmp 43 PID 3012 wrote to memory of 680 3012 5235.tmp 43 PID 3012 wrote to memory of 680 3012 5235.tmp 43 PID 3012 wrote to memory of 680 3012 5235.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_530ea3ff96d0abe7c7fcc029f7b61dd6_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\4682.tmp"C:\Users\Admin\AppData\Local\Temp\4682.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\470E.tmp"C:\Users\Admin\AppData\Local\Temp\470E.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\4846.tmp"C:\Users\Admin\AppData\Local\Temp\4846.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\48F2.tmp"C:\Users\Admin\AppData\Local\Temp\48F2.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\4BEE.tmp"C:\Users\Admin\AppData\Local\Temp\4BEE.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"C:\Users\Admin\AppData\Local\Temp\4DB3.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\4F96.tmp"C:\Users\Admin\AppData\Local\Temp\4F96.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\5080.tmp"C:\Users\Admin\AppData\Local\Temp\5080.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\514B.tmp"C:\Users\Admin\AppData\Local\Temp\514B.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\5235.tmp"C:\Users\Admin\AppData\Local\Temp\5235.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:680 -
C:\Users\Admin\AppData\Local\Temp\53CB.tmp"C:\Users\Admin\AppData\Local\Temp\53CB.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\54A5.tmp"C:\Users\Admin\AppData\Local\Temp\54A5.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\5560.tmp"C:\Users\Admin\AppData\Local\Temp\5560.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\563B.tmp"C:\Users\Admin\AppData\Local\Temp\563B.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:320 -
C:\Users\Admin\AppData\Local\Temp\56F6.tmp"C:\Users\Admin\AppData\Local\Temp\56F6.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:744 -
C:\Users\Admin\AppData\Local\Temp\57B1.tmp"C:\Users\Admin\AppData\Local\Temp\57B1.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760 -
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\5A02.tmp"C:\Users\Admin\AppData\Local\Temp\5A02.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:856 -
C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"C:\Users\Admin\AppData\Local\Temp\5B3A.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp"C:\Users\Admin\AppData\Local\Temp\5BA7.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564 -
C:\Users\Admin\AppData\Local\Temp\5C34.tmp"C:\Users\Admin\AppData\Local\Temp\5C34.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\5CA1.tmp"C:\Users\Admin\AppData\Local\Temp\5CA1.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\5D0E.tmp"C:\Users\Admin\AppData\Local\Temp\5D0E.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\5D7B.tmp"C:\Users\Admin\AppData\Local\Temp\5D7B.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\5DF8.tmp"C:\Users\Admin\AppData\Local\Temp\5DF8.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\5E84.tmp"C:\Users\Admin\AppData\Local\Temp\5E84.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\5EE2.tmp"C:\Users\Admin\AppData\Local\Temp\5EE2.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\5F5F.tmp"C:\Users\Admin\AppData\Local\Temp\5F5F.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\5FDC.tmp"C:\Users\Admin\AppData\Local\Temp\5FDC.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\6049.tmp"C:\Users\Admin\AppData\Local\Temp\6049.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\60B6.tmp"C:\Users\Admin\AppData\Local\Temp\60B6.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\6133.tmp"C:\Users\Admin\AppData\Local\Temp\6133.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\61B0.tmp"C:\Users\Admin\AppData\Local\Temp\61B0.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\622C.tmp"C:\Users\Admin\AppData\Local\Temp\622C.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\627A.tmp"C:\Users\Admin\AppData\Local\Temp\627A.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\62F7.tmp"C:\Users\Admin\AppData\Local\Temp\62F7.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\6364.tmp"C:\Users\Admin\AppData\Local\Temp\6364.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:392 -
C:\Users\Admin\AppData\Local\Temp\63E1.tmp"C:\Users\Admin\AppData\Local\Temp\63E1.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\643F.tmp"C:\Users\Admin\AppData\Local\Temp\643F.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:708 -
C:\Users\Admin\AppData\Local\Temp\64CB.tmp"C:\Users\Admin\AppData\Local\Temp\64CB.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\6548.tmp"C:\Users\Admin\AppData\Local\Temp\6548.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\65B5.tmp"C:\Users\Admin\AppData\Local\Temp\65B5.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\6613.tmp"C:\Users\Admin\AppData\Local\Temp\6613.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\6680.tmp"C:\Users\Admin\AppData\Local\Temp\6680.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\66FD.tmp"C:\Users\Admin\AppData\Local\Temp\66FD.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\677A.tmp"C:\Users\Admin\AppData\Local\Temp\677A.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\67F7.tmp"C:\Users\Admin\AppData\Local\Temp\67F7.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\6873.tmp"C:\Users\Admin\AppData\Local\Temp\6873.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\68E1.tmp"C:\Users\Admin\AppData\Local\Temp\68E1.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\696D.tmp"C:\Users\Admin\AppData\Local\Temp\696D.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\69DA.tmp"C:\Users\Admin\AppData\Local\Temp\69DA.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\6A76.tmp"C:\Users\Admin\AppData\Local\Temp\6A76.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\6AE3.tmp"C:\Users\Admin\AppData\Local\Temp\6AE3.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\6B60.tmp"C:\Users\Admin\AppData\Local\Temp\6B60.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\6BDD.tmp"C:\Users\Admin\AppData\Local\Temp\6BDD.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\6C4A.tmp"C:\Users\Admin\AppData\Local\Temp\6C4A.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\6CA8.tmp"C:\Users\Admin\AppData\Local\Temp\6CA8.tmp"65⤵
- Executes dropped EXE
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\6D15.tmp"C:\Users\Admin\AppData\Local\Temp\6D15.tmp"66⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\6D82.tmp"C:\Users\Admin\AppData\Local\Temp\6D82.tmp"67⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\6DEF.tmp"C:\Users\Admin\AppData\Local\Temp\6DEF.tmp"68⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\6F95.tmp"C:\Users\Admin\AppData\Local\Temp\6F95.tmp"69⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\7031.tmp"C:\Users\Admin\AppData\Local\Temp\7031.tmp"70⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\709E.tmp"C:\Users\Admin\AppData\Local\Temp\709E.tmp"71⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\710B.tmp"C:\Users\Admin\AppData\Local\Temp\710B.tmp"72⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\7188.tmp"C:\Users\Admin\AppData\Local\Temp\7188.tmp"73⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\71F5.tmp"C:\Users\Admin\AppData\Local\Temp\71F5.tmp"74⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\7272.tmp"C:\Users\Admin\AppData\Local\Temp\7272.tmp"75⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\72DF.tmp"C:\Users\Admin\AppData\Local\Temp\72DF.tmp"76⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\734C.tmp"C:\Users\Admin\AppData\Local\Temp\734C.tmp"77⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\73B9.tmp"C:\Users\Admin\AppData\Local\Temp\73B9.tmp"78⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\7446.tmp"C:\Users\Admin\AppData\Local\Temp\7446.tmp"79⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\74B3.tmp"C:\Users\Admin\AppData\Local\Temp\74B3.tmp"80⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\7520.tmp"C:\Users\Admin\AppData\Local\Temp\7520.tmp"81⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"82⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\7649.tmp"C:\Users\Admin\AppData\Local\Temp\7649.tmp"83⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\76B6.tmp"C:\Users\Admin\AppData\Local\Temp\76B6.tmp"84⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\7704.tmp"C:\Users\Admin\AppData\Local\Temp\7704.tmp"85⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\7761.tmp"C:\Users\Admin\AppData\Local\Temp\7761.tmp"86⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\77CF.tmp"C:\Users\Admin\AppData\Local\Temp\77CF.tmp"87⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\782C.tmp"C:\Users\Admin\AppData\Local\Temp\782C.tmp"88⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\788A.tmp"C:\Users\Admin\AppData\Local\Temp\788A.tmp"89⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\78F7.tmp"C:\Users\Admin\AppData\Local\Temp\78F7.tmp"90⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\7983.tmp"C:\Users\Admin\AppData\Local\Temp\7983.tmp"91⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\79D1.tmp"C:\Users\Admin\AppData\Local\Temp\79D1.tmp"92⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\7A3F.tmp"C:\Users\Admin\AppData\Local\Temp\7A3F.tmp"93⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\7A9C.tmp"C:\Users\Admin\AppData\Local\Temp\7A9C.tmp"94⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\7AFA.tmp"C:\Users\Admin\AppData\Local\Temp\7AFA.tmp"95⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\7B57.tmp"C:\Users\Admin\AppData\Local\Temp\7B57.tmp"96⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\7BD4.tmp"C:\Users\Admin\AppData\Local\Temp\7BD4.tmp"97⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\7C41.tmp"C:\Users\Admin\AppData\Local\Temp\7C41.tmp"98⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\7CAF.tmp"C:\Users\Admin\AppData\Local\Temp\7CAF.tmp"99⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\7D0C.tmp"C:\Users\Admin\AppData\Local\Temp\7D0C.tmp"100⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\7D89.tmp"C:\Users\Admin\AppData\Local\Temp\7D89.tmp"101⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\7DF6.tmp"C:\Users\Admin\AppData\Local\Temp\7DF6.tmp"102⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\7E63.tmp"C:\Users\Admin\AppData\Local\Temp\7E63.tmp"103⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\7EC1.tmp"C:\Users\Admin\AppData\Local\Temp\7EC1.tmp"104⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\7F4D.tmp"C:\Users\Admin\AppData\Local\Temp\7F4D.tmp"105⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\7FBB.tmp"C:\Users\Admin\AppData\Local\Temp\7FBB.tmp"106⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\8028.tmp"C:\Users\Admin\AppData\Local\Temp\8028.tmp"107⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\80A5.tmp"C:\Users\Admin\AppData\Local\Temp\80A5.tmp"108⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\8102.tmp"C:\Users\Admin\AppData\Local\Temp\8102.tmp"109⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\816F.tmp"C:\Users\Admin\AppData\Local\Temp\816F.tmp"110⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\81FC.tmp"C:\Users\Admin\AppData\Local\Temp\81FC.tmp"111⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\8279.tmp"C:\Users\Admin\AppData\Local\Temp\8279.tmp"112⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\8305.tmp"C:\Users\Admin\AppData\Local\Temp\8305.tmp"113⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\8382.tmp"C:\Users\Admin\AppData\Local\Temp\8382.tmp"114⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\845C.tmp"C:\Users\Admin\AppData\Local\Temp\845C.tmp"115⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\84C9.tmp"C:\Users\Admin\AppData\Local\Temp\84C9.tmp"116⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\8517.tmp"C:\Users\Admin\AppData\Local\Temp\8517.tmp"117⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\8565.tmp"C:\Users\Admin\AppData\Local\Temp\8565.tmp"118⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\85D3.tmp"C:\Users\Admin\AppData\Local\Temp\85D3.tmp"119⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\8621.tmp"C:\Users\Admin\AppData\Local\Temp\8621.tmp"120⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\868E.tmp"C:\Users\Admin\AppData\Local\Temp\868E.tmp"121⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\86EB.tmp"C:\Users\Admin\AppData\Local\Temp\86EB.tmp"122⤵PID:1060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-