Analysis
-
max time kernel
179s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 21:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe
-
Size
487KB
-
MD5
c6a238350367db252bae82c8a2aa88d3
-
SHA1
54c425ed67e7836a15ad6945c27ce4105805f7f5
-
SHA256
ba3166ba608dab8f0d029afc7e1919c771e9d8b96e978c5f49f24a9a74c576ad
-
SHA512
c7c091087f56233787c3d47161b4683b6342a7128b28b8f4215dbb412503ff70228d0a121a4cfc544afb35c6ab8a1d3df55202c72626f5238e1e77de6945f72c
-
SSDEEP
12288:HU5rCOTeiJg4zVHh+95YsPKTq7U/czWNZ:HUQOJJgu+TK/CWN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2844 E6E6.tmp 2952 E772.tmp 2608 E917.tmp 2572 E994.tmp 2216 EA7E.tmp 2736 EB68.tmp 1952 EC62.tmp 2784 ECFE.tmp 2908 EDB9.tmp 580 EE93.tmp 2964 FCA7.tmp 308 7AE.tmp 1564 1DAE.tmp 276 1E0C.tmp 328 1F34.tmp 2248 200E.tmp 2004 2108.tmp 1612 21E2.tmp 1504 22DC.tmp 2032 2397.tmp 2944 2481.tmp 2356 2617.tmp 1116 26B3.tmp 1916 273F.tmp 2288 27AC.tmp 980 280A.tmp 2428 2868.tmp 2316 29BF.tmp 2452 2A2C.tmp 3020 2A99.tmp 1448 2B06.tmp 1872 2B74.tmp 1876 2BF0.tmp 2028 2C5E.tmp 1740 2CCB.tmp 2260 2D48.tmp 892 2FA8.tmp 2496 3015.tmp 2340 3092.tmp 2536 5457.tmp 2512 6114.tmp 2184 670D.tmp 2524 690F.tmp 2064 696D.tmp 2980 69CB.tmp 2112 6B22.tmp 1824 6B9F.tmp 2696 6C0C.tmp 1588 6C89.tmp 2860 6D05.tmp 2856 6D82.tmp 2760 6DEF.tmp 2840 6E6C.tmp 2612 6F37.tmp 2704 6F95.tmp 2580 7002.tmp 3068 706F.tmp 2576 70EC.tmp 2736 7224.tmp 1952 72A1.tmp 2888 730E.tmp 2784 737B.tmp 2948 73C9.tmp 2960 7455.tmp -
Loads dropped DLL 64 IoCs
pid Process 2996 2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe 2844 E6E6.tmp 2952 E772.tmp 2608 E917.tmp 2572 E994.tmp 2216 EA7E.tmp 2736 EB68.tmp 1952 EC62.tmp 2784 ECFE.tmp 2908 EDB9.tmp 580 EE93.tmp 2964 FCA7.tmp 308 7AE.tmp 1564 1DAE.tmp 276 1E0C.tmp 328 1F34.tmp 2248 200E.tmp 2004 2108.tmp 1612 21E2.tmp 1504 22DC.tmp 2032 2397.tmp 2944 2481.tmp 2356 2617.tmp 1116 26B3.tmp 1916 273F.tmp 2288 27AC.tmp 980 280A.tmp 2428 2868.tmp 2316 29BF.tmp 2452 2A2C.tmp 3020 2A99.tmp 1448 2B06.tmp 1872 2B74.tmp 1876 2BF0.tmp 2028 2C5E.tmp 1740 2CCB.tmp 2260 2D48.tmp 892 2FA8.tmp 2496 3015.tmp 2340 3092.tmp 2536 5457.tmp 2512 6114.tmp 2184 670D.tmp 2524 690F.tmp 2064 696D.tmp 2980 69CB.tmp 2112 6B22.tmp 1824 6B9F.tmp 2696 6C0C.tmp 1588 6C89.tmp 2860 6D05.tmp 2856 6D82.tmp 2760 6DEF.tmp 2840 6E6C.tmp 2612 6F37.tmp 2704 6F95.tmp 2580 7002.tmp 3068 706F.tmp 2576 70EC.tmp 2736 7224.tmp 1952 72A1.tmp 2888 730E.tmp 2784 737B.tmp 2948 73C9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2844 2996 2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe 28 PID 2996 wrote to memory of 2844 2996 2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe 28 PID 2996 wrote to memory of 2844 2996 2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe 28 PID 2996 wrote to memory of 2844 2996 2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe 28 PID 2844 wrote to memory of 2952 2844 E6E6.tmp 30 PID 2844 wrote to memory of 2952 2844 E6E6.tmp 30 PID 2844 wrote to memory of 2952 2844 E6E6.tmp 30 PID 2844 wrote to memory of 2952 2844 E6E6.tmp 30 PID 2952 wrote to memory of 2608 2952 E772.tmp 31 PID 2952 wrote to memory of 2608 2952 E772.tmp 31 PID 2952 wrote to memory of 2608 2952 E772.tmp 31 PID 2952 wrote to memory of 2608 2952 E772.tmp 31 PID 2608 wrote to memory of 2572 2608 E917.tmp 32 PID 2608 wrote to memory of 2572 2608 E917.tmp 32 PID 2608 wrote to memory of 2572 2608 E917.tmp 32 PID 2608 wrote to memory of 2572 2608 E917.tmp 32 PID 2572 wrote to memory of 2216 2572 E994.tmp 33 PID 2572 wrote to memory of 2216 2572 E994.tmp 33 PID 2572 wrote to memory of 2216 2572 E994.tmp 33 PID 2572 wrote to memory of 2216 2572 E994.tmp 33 PID 2216 wrote to memory of 2736 2216 EA7E.tmp 34 PID 2216 wrote to memory of 2736 2216 EA7E.tmp 34 PID 2216 wrote to memory of 2736 2216 EA7E.tmp 34 PID 2216 wrote to memory of 2736 2216 EA7E.tmp 34 PID 2736 wrote to memory of 1952 2736 EB68.tmp 35 PID 2736 wrote to memory of 1952 2736 EB68.tmp 35 PID 2736 wrote to memory of 1952 2736 EB68.tmp 35 PID 2736 wrote to memory of 1952 2736 EB68.tmp 35 PID 1952 wrote to memory of 2784 1952 EC62.tmp 36 PID 1952 wrote to memory of 2784 1952 EC62.tmp 36 PID 1952 wrote to memory of 2784 1952 EC62.tmp 36 PID 1952 wrote to memory of 2784 1952 EC62.tmp 36 PID 2784 wrote to memory of 2908 2784 ECFE.tmp 37 PID 2784 wrote to memory of 2908 2784 ECFE.tmp 37 PID 2784 wrote to memory of 2908 2784 ECFE.tmp 37 PID 2784 wrote to memory of 2908 2784 ECFE.tmp 37 PID 2908 wrote to memory of 580 2908 EDB9.tmp 38 PID 2908 wrote to memory of 580 2908 EDB9.tmp 38 PID 2908 wrote to memory of 580 2908 EDB9.tmp 38 PID 2908 wrote to memory of 580 2908 EDB9.tmp 38 PID 580 wrote to memory of 2964 580 EE93.tmp 39 PID 580 wrote to memory of 2964 580 EE93.tmp 39 PID 580 wrote to memory of 2964 580 EE93.tmp 39 PID 580 wrote to memory of 2964 580 EE93.tmp 39 PID 2964 wrote to memory of 308 2964 FCA7.tmp 40 PID 2964 wrote to memory of 308 2964 FCA7.tmp 40 PID 2964 wrote to memory of 308 2964 FCA7.tmp 40 PID 2964 wrote to memory of 308 2964 FCA7.tmp 40 PID 308 wrote to memory of 1564 308 7AE.tmp 41 PID 308 wrote to memory of 1564 308 7AE.tmp 41 PID 308 wrote to memory of 1564 308 7AE.tmp 41 PID 308 wrote to memory of 1564 308 7AE.tmp 41 PID 1564 wrote to memory of 276 1564 1DAE.tmp 42 PID 1564 wrote to memory of 276 1564 1DAE.tmp 42 PID 1564 wrote to memory of 276 1564 1DAE.tmp 42 PID 1564 wrote to memory of 276 1564 1DAE.tmp 42 PID 276 wrote to memory of 328 276 1E0C.tmp 43 PID 276 wrote to memory of 328 276 1E0C.tmp 43 PID 276 wrote to memory of 328 276 1E0C.tmp 43 PID 276 wrote to memory of 328 276 1E0C.tmp 43 PID 328 wrote to memory of 2248 328 1F34.tmp 44 PID 328 wrote to memory of 2248 328 1F34.tmp 44 PID 328 wrote to memory of 2248 328 1F34.tmp 44 PID 328 wrote to memory of 2248 328 1F34.tmp 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_c6a238350367db252bae82c8a2aa88d3_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\E6E6.tmp"C:\Users\Admin\AppData\Local\Temp\E6E6.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\E772.tmp"C:\Users\Admin\AppData\Local\Temp\E772.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\E917.tmp"C:\Users\Admin\AppData\Local\Temp\E917.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\E994.tmp"C:\Users\Admin\AppData\Local\Temp\E994.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\EA7E.tmp"C:\Users\Admin\AppData\Local\Temp\EA7E.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\EB68.tmp"C:\Users\Admin\AppData\Local\Temp\EB68.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\EC62.tmp"C:\Users\Admin\AppData\Local\Temp\EC62.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\ECFE.tmp"C:\Users\Admin\AppData\Local\Temp\ECFE.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\EDB9.tmp"C:\Users\Admin\AppData\Local\Temp\EDB9.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\EE93.tmp"C:\Users\Admin\AppData\Local\Temp\EE93.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\FCA7.tmp"C:\Users\Admin\AppData\Local\Temp\FCA7.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\7AE.tmp"C:\Users\Admin\AppData\Local\Temp\7AE.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\1F34.tmp"C:\Users\Admin\AppData\Local\Temp\1F34.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\200E.tmp"C:\Users\Admin\AppData\Local\Temp\200E.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\21E2.tmp"C:\Users\Admin\AppData\Local\Temp\21E2.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\22DC.tmp"C:\Users\Admin\AppData\Local\Temp\22DC.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\2397.tmp"C:\Users\Admin\AppData\Local\Temp\2397.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\2481.tmp"C:\Users\Admin\AppData\Local\Temp\2481.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\26B3.tmp"C:\Users\Admin\AppData\Local\Temp\26B3.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\273F.tmp"C:\Users\Admin\AppData\Local\Temp\273F.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\27AC.tmp"C:\Users\Admin\AppData\Local\Temp\27AC.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980 -
C:\Users\Admin\AppData\Local\Temp\2868.tmp"C:\Users\Admin\AppData\Local\Temp\2868.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\2A99.tmp"C:\Users\Admin\AppData\Local\Temp\2A99.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\2B74.tmp"C:\Users\Admin\AppData\Local\Temp\2B74.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"C:\Users\Admin\AppData\Local\Temp\2BF0.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"C:\Users\Admin\AppData\Local\Temp\2C5E.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3015.tmp"C:\Users\Admin\AppData\Local\Temp\3015.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\5457.tmp"C:\Users\Admin\AppData\Local\Temp\5457.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\6114.tmp"C:\Users\Admin\AppData\Local\Temp\6114.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\670D.tmp"C:\Users\Admin\AppData\Local\Temp\670D.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\690F.tmp"C:\Users\Admin\AppData\Local\Temp\690F.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\696D.tmp"C:\Users\Admin\AppData\Local\Temp\696D.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\69CB.tmp"C:\Users\Admin\AppData\Local\Temp\69CB.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\6B22.tmp"C:\Users\Admin\AppData\Local\Temp\6B22.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\6B9F.tmp"C:\Users\Admin\AppData\Local\Temp\6B9F.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\6C0C.tmp"C:\Users\Admin\AppData\Local\Temp\6C0C.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\6C89.tmp"C:\Users\Admin\AppData\Local\Temp\6C89.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\6D05.tmp"C:\Users\Admin\AppData\Local\Temp\6D05.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\6D82.tmp"C:\Users\Admin\AppData\Local\Temp\6D82.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\6DEF.tmp"C:\Users\Admin\AppData\Local\Temp\6DEF.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\6E6C.tmp"C:\Users\Admin\AppData\Local\Temp\6E6C.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\6F37.tmp"C:\Users\Admin\AppData\Local\Temp\6F37.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\6F95.tmp"C:\Users\Admin\AppData\Local\Temp\6F95.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\7002.tmp"C:\Users\Admin\AppData\Local\Temp\7002.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\706F.tmp"C:\Users\Admin\AppData\Local\Temp\706F.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\70EC.tmp"C:\Users\Admin\AppData\Local\Temp\70EC.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\7224.tmp"C:\Users\Admin\AppData\Local\Temp\7224.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\72A1.tmp"C:\Users\Admin\AppData\Local\Temp\72A1.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\730E.tmp"C:\Users\Admin\AppData\Local\Temp\730E.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\737B.tmp"C:\Users\Admin\AppData\Local\Temp\737B.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\73C9.tmp"C:\Users\Admin\AppData\Local\Temp\73C9.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\7455.tmp"C:\Users\Admin\AppData\Local\Temp\7455.tmp"65⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\74D2.tmp"C:\Users\Admin\AppData\Local\Temp\74D2.tmp"66⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"67⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\75BC.tmp"C:\Users\Admin\AppData\Local\Temp\75BC.tmp"68⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\7629.tmp"C:\Users\Admin\AppData\Local\Temp\7629.tmp"69⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\7687.tmp"C:\Users\Admin\AppData\Local\Temp\7687.tmp"70⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\7713.tmp"C:\Users\Admin\AppData\Local\Temp\7713.tmp"71⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\77DE.tmp"C:\Users\Admin\AppData\Local\Temp\77DE.tmp"72⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\784B.tmp"C:\Users\Admin\AppData\Local\Temp\784B.tmp"73⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\78C8.tmp"C:\Users\Admin\AppData\Local\Temp\78C8.tmp"74⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\7935.tmp"C:\Users\Admin\AppData\Local\Temp\7935.tmp"75⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\79A3.tmp"C:\Users\Admin\AppData\Local\Temp\79A3.tmp"76⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\7A1F.tmp"C:\Users\Admin\AppData\Local\Temp\7A1F.tmp"77⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\A2C5.tmp"C:\Users\Admin\AppData\Local\Temp\A2C5.tmp"78⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\B3B5.tmp"C:\Users\Admin\AppData\Local\Temp\B3B5.tmp"79⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\B432.tmp"C:\Users\Admin\AppData\Local\Temp\B432.tmp"80⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\B4AF.tmp"C:\Users\Admin\AppData\Local\Temp\B4AF.tmp"81⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\B5A9.tmp"C:\Users\Admin\AppData\Local\Temp\B5A9.tmp"82⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\B625.tmp"C:\Users\Admin\AppData\Local\Temp\B625.tmp"83⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\B6E1.tmp"C:\Users\Admin\AppData\Local\Temp\B6E1.tmp"84⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\B74E.tmp"C:\Users\Admin\AppData\Local\Temp\B74E.tmp"85⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\B7BB.tmp"C:\Users\Admin\AppData\Local\Temp\B7BB.tmp"86⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\B8F3.tmp"C:\Users\Admin\AppData\Local\Temp\B8F3.tmp"87⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\B97F.tmp"C:\Users\Admin\AppData\Local\Temp\B97F.tmp"88⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\B9ED.tmp"C:\Users\Admin\AppData\Local\Temp\B9ED.tmp"89⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\BA69.tmp"C:\Users\Admin\AppData\Local\Temp\BA69.tmp"90⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\BAD7.tmp"C:\Users\Admin\AppData\Local\Temp\BAD7.tmp"91⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\BB44.tmp"C:\Users\Admin\AppData\Local\Temp\BB44.tmp"92⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\BBB1.tmp"C:\Users\Admin\AppData\Local\Temp\BBB1.tmp"93⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\BC0F.tmp"C:\Users\Admin\AppData\Local\Temp\BC0F.tmp"94⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\BCBA.tmp"C:\Users\Admin\AppData\Local\Temp\BCBA.tmp"95⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\BD27.tmp"C:\Users\Admin\AppData\Local\Temp\BD27.tmp"96⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\BDA4.tmp"C:\Users\Admin\AppData\Local\Temp\BDA4.tmp"97⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\BE6F.tmp"C:\Users\Admin\AppData\Local\Temp\BE6F.tmp"98⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\BEDC.tmp"C:\Users\Admin\AppData\Local\Temp\BEDC.tmp"99⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\BF59.tmp"C:\Users\Admin\AppData\Local\Temp\BF59.tmp"100⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\C005.tmp"C:\Users\Admin\AppData\Local\Temp\C005.tmp"101⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\C062.tmp"C:\Users\Admin\AppData\Local\Temp\C062.tmp"102⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"C:\Users\Admin\AppData\Local\Temp\C0DF.tmp"103⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"104⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\DEEA.tmp"C:\Users\Admin\AppData\Local\Temp\DEEA.tmp"105⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\F299.tmp"C:\Users\Admin\AppData\Local\Temp\F299.tmp"106⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\FAC3.tmp"C:\Users\Admin\AppData\Local\Temp\FAC3.tmp"107⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\FBCC.tmp"C:\Users\Admin\AppData\Local\Temp\FBCC.tmp"108⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\FC49.tmp"C:\Users\Admin\AppData\Local\Temp\FC49.tmp"109⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\FCC6.tmp"C:\Users\Admin\AppData\Local\Temp\FCC6.tmp"110⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\FDEE.tmp"C:\Users\Admin\AppData\Local\Temp\FDEE.tmp"111⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\FE6B.tmp"C:\Users\Admin\AppData\Local\Temp\FE6B.tmp"112⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\FED8.tmp"C:\Users\Admin\AppData\Local\Temp\FED8.tmp"113⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\FF55.tmp"C:\Users\Admin\AppData\Local\Temp\FF55.tmp"114⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\FFD2.tmp"C:\Users\Admin\AppData\Local\Temp\FFD2.tmp"115⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\8D.tmp"C:\Users\Admin\AppData\Local\Temp\8D.tmp"116⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\10A.tmp"C:\Users\Admin\AppData\Local\Temp\10A.tmp"117⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\187.tmp"C:\Users\Admin\AppData\Local\Temp\187.tmp"118⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\204.tmp"C:\Users\Admin\AppData\Local\Temp\204.tmp"119⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\2AF.tmp"C:\Users\Admin\AppData\Local\Temp\2AF.tmp"120⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2FD.tmp"C:\Users\Admin\AppData\Local\Temp\2FD.tmp"121⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\36A.tmp"C:\Users\Admin\AppData\Local\Temp\36A.tmp"122⤵PID:2776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-