Analysis
-
max time kernel
156s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 13:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe
Resource
win10v2004-20240220-en
2 signatures
150 seconds
General
-
Target
2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe
-
Size
520KB
-
MD5
5c1b6b42810879bdea21a258d1820519
-
SHA1
1ab6c329f725eaedfa4dc49e1ceb235382b838af
-
SHA256
05cd95400b7e7f7a2182eed611c8bc7252084391914fe1b387d8c2e51906c682
-
SHA512
61bcee2d8d287fb6bb654991db6b7caf10e7a78b9eb6a5323b68effb07705b9539e61a05ded60053124af6d79dd7a17b2b0c7d301694a15201954bf2fc5c26e1
-
SSDEEP
12288:gj8fuxR21t5i8fuP7a++Fs4YzWo/V2tdcB32NZ:gj8fuK1GYsos4UWg2tdcB32N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1984 99DF.tmp 2716 A219.tmp 2888 A322.tmp 2680 A41C.tmp 2584 A515.tmp 2612 A5E0.tmp 2712 A6AB.tmp 2576 A785.tmp 2648 A860.tmp 2904 A93A.tmp 2556 A9D6.tmp 2944 AAD0.tmp 3008 AB8B.tmp 1716 AC27.tmp 472 ACE2.tmp 2852 ADEB.tmp 1704 AE97.tmp 2844 AF81.tmp 756 B04C.tmp 516 B165.tmp 1084 B22F.tmp 2936 B319.tmp 1656 B3E4.tmp 1676 B461.tmp 1548 B4DE.tmp 1700 B55B.tmp 2072 B5B8.tmp 1756 BDA4.tmp 2364 BFD6.tmp 3064 CAAF.tmp 1224 CB2B.tmp 2420 CB99.tmp 1140 CC15.tmp 2376 CC92.tmp 2092 CCFF.tmp 1088 CD7C.tmp 828 CE66.tmp 1556 CEF3.tmp 944 CF6F.tmp 1860 CFEC.tmp 1744 D059.tmp 1620 D134.tmp 2324 D191.tmp 2100 D20E.tmp 988 D27B.tmp 1372 D2F8.tmp 2496 D365.tmp 2424 D3D3.tmp 1940 D440.tmp 1504 D4CC.tmp 1800 D539.tmp 1192 D5B6.tmp 1424 D623.tmp 1612 D691.tmp 2388 D6DF.tmp 2716 D74C.tmp 2760 D7A9.tmp 2888 D97D.tmp 2684 D9EB.tmp 2736 DA67.tmp 2600 DB42.tmp 1996 DB9F.tmp 2688 DC1C.tmp 2712 DC89.tmp -
Loads dropped DLL 64 IoCs
pid Process 1720 2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe 1984 99DF.tmp 2716 A219.tmp 2888 A322.tmp 2680 A41C.tmp 2584 A515.tmp 2612 A5E0.tmp 2712 A6AB.tmp 2576 A785.tmp 2648 A860.tmp 2904 A93A.tmp 2556 A9D6.tmp 2944 AAD0.tmp 3008 AB8B.tmp 1716 AC27.tmp 472 ACE2.tmp 2852 ADEB.tmp 1704 AE97.tmp 2844 AF81.tmp 756 B04C.tmp 516 B165.tmp 1084 B22F.tmp 2936 B319.tmp 1656 B3E4.tmp 1676 B461.tmp 1548 B4DE.tmp 1700 B55B.tmp 2072 B5B8.tmp 1756 BDA4.tmp 2364 BFD6.tmp 3064 CAAF.tmp 1224 CB2B.tmp 2420 CB99.tmp 1140 CC15.tmp 2376 CC92.tmp 2092 CCFF.tmp 1088 CD7C.tmp 828 CE66.tmp 1556 CEF3.tmp 944 CF6F.tmp 1860 CFEC.tmp 1744 D059.tmp 1620 D134.tmp 2324 D191.tmp 2100 D20E.tmp 988 D27B.tmp 1372 D2F8.tmp 2496 D365.tmp 2424 D3D3.tmp 1940 D440.tmp 1504 D4CC.tmp 1800 D539.tmp 1192 D5B6.tmp 1424 D623.tmp 1612 D691.tmp 2388 D6DF.tmp 2716 D74C.tmp 2760 D7A9.tmp 2888 D97D.tmp 2684 D9EB.tmp 2736 DA67.tmp 2600 DB42.tmp 1996 DB9F.tmp 2688 DC1C.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1984 1720 2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe 28 PID 1720 wrote to memory of 1984 1720 2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe 28 PID 1720 wrote to memory of 1984 1720 2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe 28 PID 1720 wrote to memory of 1984 1720 2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe 28 PID 1984 wrote to memory of 2716 1984 99DF.tmp 29 PID 1984 wrote to memory of 2716 1984 99DF.tmp 29 PID 1984 wrote to memory of 2716 1984 99DF.tmp 29 PID 1984 wrote to memory of 2716 1984 99DF.tmp 29 PID 2716 wrote to memory of 2888 2716 A219.tmp 30 PID 2716 wrote to memory of 2888 2716 A219.tmp 30 PID 2716 wrote to memory of 2888 2716 A219.tmp 30 PID 2716 wrote to memory of 2888 2716 A219.tmp 30 PID 2888 wrote to memory of 2680 2888 A322.tmp 31 PID 2888 wrote to memory of 2680 2888 A322.tmp 31 PID 2888 wrote to memory of 2680 2888 A322.tmp 31 PID 2888 wrote to memory of 2680 2888 A322.tmp 31 PID 2680 wrote to memory of 2584 2680 A41C.tmp 32 PID 2680 wrote to memory of 2584 2680 A41C.tmp 32 PID 2680 wrote to memory of 2584 2680 A41C.tmp 32 PID 2680 wrote to memory of 2584 2680 A41C.tmp 32 PID 2584 wrote to memory of 2612 2584 A515.tmp 33 PID 2584 wrote to memory of 2612 2584 A515.tmp 33 PID 2584 wrote to memory of 2612 2584 A515.tmp 33 PID 2584 wrote to memory of 2612 2584 A515.tmp 33 PID 2612 wrote to memory of 2712 2612 A5E0.tmp 34 PID 2612 wrote to memory of 2712 2612 A5E0.tmp 34 PID 2612 wrote to memory of 2712 2612 A5E0.tmp 34 PID 2612 wrote to memory of 2712 2612 A5E0.tmp 34 PID 2712 wrote to memory of 2576 2712 A6AB.tmp 35 PID 2712 wrote to memory of 2576 2712 A6AB.tmp 35 PID 2712 wrote to memory of 2576 2712 A6AB.tmp 35 PID 2712 wrote to memory of 2576 2712 A6AB.tmp 35 PID 2576 wrote to memory of 2648 2576 A785.tmp 36 PID 2576 wrote to memory of 2648 2576 A785.tmp 36 PID 2576 wrote to memory of 2648 2576 A785.tmp 36 PID 2576 wrote to memory of 2648 2576 A785.tmp 36 PID 2648 wrote to memory of 2904 2648 A860.tmp 37 PID 2648 wrote to memory of 2904 2648 A860.tmp 37 PID 2648 wrote to memory of 2904 2648 A860.tmp 37 PID 2648 wrote to memory of 2904 2648 A860.tmp 37 PID 2904 wrote to memory of 2556 2904 A93A.tmp 38 PID 2904 wrote to memory of 2556 2904 A93A.tmp 38 PID 2904 wrote to memory of 2556 2904 A93A.tmp 38 PID 2904 wrote to memory of 2556 2904 A93A.tmp 38 PID 2556 wrote to memory of 2944 2556 A9D6.tmp 39 PID 2556 wrote to memory of 2944 2556 A9D6.tmp 39 PID 2556 wrote to memory of 2944 2556 A9D6.tmp 39 PID 2556 wrote to memory of 2944 2556 A9D6.tmp 39 PID 2944 wrote to memory of 3008 2944 AAD0.tmp 40 PID 2944 wrote to memory of 3008 2944 AAD0.tmp 40 PID 2944 wrote to memory of 3008 2944 AAD0.tmp 40 PID 2944 wrote to memory of 3008 2944 AAD0.tmp 40 PID 3008 wrote to memory of 1716 3008 AB8B.tmp 41 PID 3008 wrote to memory of 1716 3008 AB8B.tmp 41 PID 3008 wrote to memory of 1716 3008 AB8B.tmp 41 PID 3008 wrote to memory of 1716 3008 AB8B.tmp 41 PID 1716 wrote to memory of 472 1716 AC27.tmp 42 PID 1716 wrote to memory of 472 1716 AC27.tmp 42 PID 1716 wrote to memory of 472 1716 AC27.tmp 42 PID 1716 wrote to memory of 472 1716 AC27.tmp 42 PID 472 wrote to memory of 2852 472 ACE2.tmp 43 PID 472 wrote to memory of 2852 472 ACE2.tmp 43 PID 472 wrote to memory of 2852 472 ACE2.tmp 43 PID 472 wrote to memory of 2852 472 ACE2.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-21_5c1b6b42810879bdea21a258d1820519_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\99DF.tmp"C:\Users\Admin\AppData\Local\Temp\99DF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\A219.tmp"C:\Users\Admin\AppData\Local\Temp\A219.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\A322.tmp"C:\Users\Admin\AppData\Local\Temp\A322.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\A41C.tmp"C:\Users\Admin\AppData\Local\Temp\A41C.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\A515.tmp"C:\Users\Admin\AppData\Local\Temp\A515.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"C:\Users\Admin\AppData\Local\Temp\A5E0.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\A6AB.tmp"C:\Users\Admin\AppData\Local\Temp\A6AB.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\A785.tmp"C:\Users\Admin\AppData\Local\Temp\A785.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\A860.tmp"C:\Users\Admin\AppData\Local\Temp\A860.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\A93A.tmp"C:\Users\Admin\AppData\Local\Temp\A93A.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\A9D6.tmp"C:\Users\Admin\AppData\Local\Temp\A9D6.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\AAD0.tmp"C:\Users\Admin\AppData\Local\Temp\AAD0.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\AB8B.tmp"C:\Users\Admin\AppData\Local\Temp\AB8B.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\AC27.tmp"C:\Users\Admin\AppData\Local\Temp\AC27.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\ACE2.tmp"C:\Users\Admin\AppData\Local\Temp\ACE2.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Users\Admin\AppData\Local\Temp\ADEB.tmp"C:\Users\Admin\AppData\Local\Temp\ADEB.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\AE97.tmp"C:\Users\Admin\AppData\Local\Temp\AE97.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\AF81.tmp"C:\Users\Admin\AppData\Local\Temp\AF81.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\B04C.tmp"C:\Users\Admin\AppData\Local\Temp\B04C.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:756 -
C:\Users\Admin\AppData\Local\Temp\B165.tmp"C:\Users\Admin\AppData\Local\Temp\B165.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516 -
C:\Users\Admin\AppData\Local\Temp\B22F.tmp"C:\Users\Admin\AppData\Local\Temp\B22F.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\B319.tmp"C:\Users\Admin\AppData\Local\Temp\B319.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\B3E4.tmp"C:\Users\Admin\AppData\Local\Temp\B3E4.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\B461.tmp"C:\Users\Admin\AppData\Local\Temp\B461.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\B4DE.tmp"C:\Users\Admin\AppData\Local\Temp\B4DE.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\B55B.tmp"C:\Users\Admin\AppData\Local\Temp\B55B.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\B5B8.tmp"C:\Users\Admin\AppData\Local\Temp\B5B8.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\BDA4.tmp"C:\Users\Admin\AppData\Local\Temp\BDA4.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\BFD6.tmp"C:\Users\Admin\AppData\Local\Temp\BFD6.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\CAAF.tmp"C:\Users\Admin\AppData\Local\Temp\CAAF.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\CB2B.tmp"C:\Users\Admin\AppData\Local\Temp\CB2B.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\CB99.tmp"C:\Users\Admin\AppData\Local\Temp\CB99.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\CC15.tmp"C:\Users\Admin\AppData\Local\Temp\CC15.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\CC92.tmp"C:\Users\Admin\AppData\Local\Temp\CC92.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\CCFF.tmp"C:\Users\Admin\AppData\Local\Temp\CCFF.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\CD7C.tmp"C:\Users\Admin\AppData\Local\Temp\CD7C.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\CE66.tmp"C:\Users\Admin\AppData\Local\Temp\CE66.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:828 -
C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"C:\Users\Admin\AppData\Local\Temp\CEF3.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\CF6F.tmp"C:\Users\Admin\AppData\Local\Temp\CF6F.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:944 -
C:\Users\Admin\AppData\Local\Temp\CFEC.tmp"C:\Users\Admin\AppData\Local\Temp\CFEC.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\D059.tmp"C:\Users\Admin\AppData\Local\Temp\D059.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\D134.tmp"C:\Users\Admin\AppData\Local\Temp\D134.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\D191.tmp"C:\Users\Admin\AppData\Local\Temp\D191.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\D20E.tmp"C:\Users\Admin\AppData\Local\Temp\D20E.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\D27B.tmp"C:\Users\Admin\AppData\Local\Temp\D27B.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:988 -
C:\Users\Admin\AppData\Local\Temp\D2F8.tmp"C:\Users\Admin\AppData\Local\Temp\D2F8.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\D365.tmp"C:\Users\Admin\AppData\Local\Temp\D365.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\D3D3.tmp"C:\Users\Admin\AppData\Local\Temp\D3D3.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\D440.tmp"C:\Users\Admin\AppData\Local\Temp\D440.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\D4CC.tmp"C:\Users\Admin\AppData\Local\Temp\D4CC.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\D539.tmp"C:\Users\Admin\AppData\Local\Temp\D539.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\D5B6.tmp"C:\Users\Admin\AppData\Local\Temp\D5B6.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\D623.tmp"C:\Users\Admin\AppData\Local\Temp\D623.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\D691.tmp"C:\Users\Admin\AppData\Local\Temp\D691.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\D6DF.tmp"C:\Users\Admin\AppData\Local\Temp\D6DF.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\D74C.tmp"C:\Users\Admin\AppData\Local\Temp\D74C.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\D7A9.tmp"C:\Users\Admin\AppData\Local\Temp\D7A9.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\D97D.tmp"C:\Users\Admin\AppData\Local\Temp\D97D.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\D9EB.tmp"C:\Users\Admin\AppData\Local\Temp\D9EB.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\DA67.tmp"C:\Users\Admin\AppData\Local\Temp\DA67.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\DB42.tmp"C:\Users\Admin\AppData\Local\Temp\DB42.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\DB9F.tmp"C:\Users\Admin\AppData\Local\Temp\DB9F.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\DC1C.tmp"C:\Users\Admin\AppData\Local\Temp\DC1C.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\DC89.tmp"C:\Users\Admin\AppData\Local\Temp\DC89.tmp"65⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\DD06.tmp"C:\Users\Admin\AppData\Local\Temp\DD06.tmp"66⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\DD83.tmp"C:\Users\Admin\AppData\Local\Temp\DD83.tmp"67⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\DDF0.tmp"C:\Users\Admin\AppData\Local\Temp\DDF0.tmp"68⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\DEDA.tmp"C:\Users\Admin\AppData\Local\Temp\DEDA.tmp"69⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\ECFE.tmp"C:\Users\Admin\AppData\Local\Temp\ECFE.tmp"70⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\EF10.tmp"C:\Users\Admin\AppData\Local\Temp\EF10.tmp"71⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\F2B8.tmp"C:\Users\Admin\AppData\Local\Temp\F2B8.tmp"72⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\F509.tmp"C:\Users\Admin\AppData\Local\Temp\F509.tmp"73⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\F576.tmp"C:\Users\Admin\AppData\Local\Temp\F576.tmp"74⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\F5E3.tmp"C:\Users\Admin\AppData\Local\Temp\F5E3.tmp"75⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\F660.tmp"C:\Users\Admin\AppData\Local\Temp\F660.tmp"76⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\F6CD.tmp"C:\Users\Admin\AppData\Local\Temp\F6CD.tmp"77⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\F73A.tmp"C:\Users\Admin\AppData\Local\Temp\F73A.tmp"78⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\F798.tmp"C:\Users\Admin\AppData\Local\Temp\F798.tmp"79⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\F805.tmp"C:\Users\Admin\AppData\Local\Temp\F805.tmp"80⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\F892.tmp"C:\Users\Admin\AppData\Local\Temp\F892.tmp"81⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\F93D.tmp"C:\Users\Admin\AppData\Local\Temp\F93D.tmp"82⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\F9AA.tmp"C:\Users\Admin\AppData\Local\Temp\F9AA.tmp"83⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\FA27.tmp"C:\Users\Admin\AppData\Local\Temp\FA27.tmp"84⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\FAE2.tmp"C:\Users\Admin\AppData\Local\Temp\FAE2.tmp"85⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\FB40.tmp"C:\Users\Admin\AppData\Local\Temp\FB40.tmp"86⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\FB9E.tmp"C:\Users\Admin\AppData\Local\Temp\FB9E.tmp"87⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\FC88.tmp"C:\Users\Admin\AppData\Local\Temp\FC88.tmp"88⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\FCE5.tmp"C:\Users\Admin\AppData\Local\Temp\FCE5.tmp"89⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\FD52.tmp"C:\Users\Admin\AppData\Local\Temp\FD52.tmp"90⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\FE4C.tmp"C:\Users\Admin\AppData\Local\Temp\FE4C.tmp"91⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\FF17.tmp"C:\Users\Admin\AppData\Local\Temp\FF17.tmp"92⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\FF74.tmp"C:\Users\Admin\AppData\Local\Temp\FF74.tmp"93⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\FFE2.tmp"C:\Users\Admin\AppData\Local\Temp\FFE2.tmp"94⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\6E.tmp"C:\Users\Admin\AppData\Local\Temp\6E.tmp"95⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\DB.tmp"C:\Users\Admin\AppData\Local\Temp\DB.tmp"96⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\148.tmp"C:\Users\Admin\AppData\Local\Temp\148.tmp"97⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\1B6.tmp"C:\Users\Admin\AppData\Local\Temp\1B6.tmp"98⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\290.tmp"C:\Users\Admin\AppData\Local\Temp\290.tmp"99⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\2EE.tmp"C:\Users\Admin\AppData\Local\Temp\2EE.tmp"100⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\34B.tmp"C:\Users\Admin\AppData\Local\Temp\34B.tmp"101⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\3C8.tmp"C:\Users\Admin\AppData\Local\Temp\3C8.tmp"102⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\435.tmp"C:\Users\Admin\AppData\Local\Temp\435.tmp"103⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\4C2.tmp"C:\Users\Admin\AppData\Local\Temp\4C2.tmp"104⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\53E.tmp"C:\Users\Admin\AppData\Local\Temp\53E.tmp"105⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\59C.tmp"C:\Users\Admin\AppData\Local\Temp\59C.tmp"106⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\6D4.tmp"C:\Users\Admin\AppData\Local\Temp\6D4.tmp"107⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\751.tmp"C:\Users\Admin\AppData\Local\Temp\751.tmp"108⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\7CE.tmp"C:\Users\Admin\AppData\Local\Temp\7CE.tmp"109⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\954.tmp"C:\Users\Admin\AppData\Local\Temp\954.tmp"110⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\A8C.tmp"C:\Users\Admin\AppData\Local\Temp\A8C.tmp"111⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\BF2.tmp"C:\Users\Admin\AppData\Local\Temp\BF2.tmp"112⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\C50.tmp"C:\Users\Admin\AppData\Local\Temp\C50.tmp"113⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\CAE.tmp"C:\Users\Admin\AppData\Local\Temp\CAE.tmp"114⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\D1B.tmp"C:\Users\Admin\AppData\Local\Temp\D1B.tmp"115⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\D69.tmp"C:\Users\Admin\AppData\Local\Temp\D69.tmp"116⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\DD6.tmp"C:\Users\Admin\AppData\Local\Temp\DD6.tmp"117⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\E34.tmp"C:\Users\Admin\AppData\Local\Temp\E34.tmp"118⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\EA1.tmp"C:\Users\Admin\AppData\Local\Temp\EA1.tmp"119⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\EFE.tmp"C:\Users\Admin\AppData\Local\Temp\EFE.tmp"120⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\F5C.tmp"C:\Users\Admin\AppData\Local\Temp\F5C.tmp"121⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\FD9.tmp"C:\Users\Admin\AppData\Local\Temp\FD9.tmp"122⤵PID:2724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-