Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 18:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe
-
Size
520KB
-
MD5
43c1913035c08bdc8954e3e4d20a3279
-
SHA1
edb1393191c3a8a90726ebed36c5df75dfbb6d0b
-
SHA256
037cf4d0ea744c505ce3acf53a848d667a2bdbbd2a8a5d2ed55360811ec51e8b
-
SHA512
1a9f30be6d6708086ac3848b4826ffab2d1a316b90bcb704138906814378366f3c948458b9b91d98fcc832a87dd34e8c38666f24ac6ad59d38cdff2f6932c84f
-
SSDEEP
12288:w9K65BmtNxS3bwrzk62Uhfakbx5Rnx9K2ju2s+qu2NZ:w9K6ytebwE6J5n3W2s+SN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3808 1F6A.tmp 2776 216E.tmp 4860 2248.tmp 4492 2333.tmp 2788 23DF.tmp 1680 246B.tmp 4772 4476.tmp 1040 25B3.tmp 5016 265F.tmp 1848 5D7D.tmp 3920 463B.tmp 3824 2863.tmp 1612 294D.tmp 1844 605B.tmp 1952 2A95.tmp 556 61B3.tmp 4256 2C5A.tmp 1988 4A72.tmp 692 2DA3.tmp 5076 6424.tmp 3480 2F0A.tmp 3384 2FD5.tmp 4048 6647.tmp 4700 30FE.tmp 4420 31C9.tmp 1276 3285.tmp 2992 3330.tmp 4896 33DC.tmp 3888 mousocoreworker.exe 4784 3544.tmp 2148 35B1.tmp 3176 368C.tmp 4288 3747.tmp 1280 37D4.tmp 2652 3870.tmp 412 38FD.tmp 2856 6A1F.tmp 4436 3A64.tmp 4780 3AF1.tmp 116 3B6E.tmp 100 3BEB.tmp 3216 3C68.tmp 3912 71DF.tmp 4252 3D52.tmp 4940 3DCF.tmp 3640 3E4C.tmp 4864 3EC9.tmp 4000 3F37.tmp 4424 3FA4.tmp 1456 4011.tmp 2436 6F20.tmp 3256 59D3.tmp 4080 5A40.tmp 2776 41E6.tmp 4168 4253.tmp 1116 42C1.tmp 3788 432E.tmp 4400 439C.tmp 1072 5C83.tmp 4772 4476.tmp 968 44E4.tmp 4292 4551.tmp 4504 45BE.tmp 3920 463B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3808 2980 43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe 86 PID 2980 wrote to memory of 3808 2980 43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe 86 PID 2980 wrote to memory of 3808 2980 43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe 86 PID 3808 wrote to memory of 2776 3808 1F6A.tmp 87 PID 3808 wrote to memory of 2776 3808 1F6A.tmp 87 PID 3808 wrote to memory of 2776 3808 1F6A.tmp 87 PID 2776 wrote to memory of 4860 2776 216E.tmp 88 PID 2776 wrote to memory of 4860 2776 216E.tmp 88 PID 2776 wrote to memory of 4860 2776 216E.tmp 88 PID 4860 wrote to memory of 4492 4860 2248.tmp 89 PID 4860 wrote to memory of 4492 4860 2248.tmp 89 PID 4860 wrote to memory of 4492 4860 2248.tmp 89 PID 4492 wrote to memory of 2788 4492 2333.tmp 90 PID 4492 wrote to memory of 2788 4492 2333.tmp 90 PID 4492 wrote to memory of 2788 4492 2333.tmp 90 PID 2788 wrote to memory of 1680 2788 23DF.tmp 91 PID 2788 wrote to memory of 1680 2788 23DF.tmp 91 PID 2788 wrote to memory of 1680 2788 23DF.tmp 91 PID 1680 wrote to memory of 4772 1680 246B.tmp 150 PID 1680 wrote to memory of 4772 1680 246B.tmp 150 PID 1680 wrote to memory of 4772 1680 246B.tmp 150 PID 4772 wrote to memory of 1040 4772 4476.tmp 93 PID 4772 wrote to memory of 1040 4772 4476.tmp 93 PID 4772 wrote to memory of 1040 4772 4476.tmp 93 PID 1040 wrote to memory of 5016 1040 25B3.tmp 94 PID 1040 wrote to memory of 5016 1040 25B3.tmp 94 PID 1040 wrote to memory of 5016 1040 25B3.tmp 94 PID 5016 wrote to memory of 1848 5016 265F.tmp 206 PID 5016 wrote to memory of 1848 5016 265F.tmp 206 PID 5016 wrote to memory of 1848 5016 265F.tmp 206 PID 1848 wrote to memory of 3920 1848 5D7D.tmp 154 PID 1848 wrote to memory of 3920 1848 5D7D.tmp 154 PID 1848 wrote to memory of 3920 1848 5D7D.tmp 154 PID 3920 wrote to memory of 3824 3920 463B.tmp 97 PID 3920 wrote to memory of 3824 3920 463B.tmp 97 PID 3920 wrote to memory of 3824 3920 463B.tmp 97 PID 3824 wrote to memory of 1612 3824 2863.tmp 98 PID 3824 wrote to memory of 1612 3824 2863.tmp 98 PID 3824 wrote to memory of 1612 3824 2863.tmp 98 PID 1612 wrote to memory of 1844 1612 294D.tmp 212 PID 1612 wrote to memory of 1844 1612 294D.tmp 212 PID 1612 wrote to memory of 1844 1612 294D.tmp 212 PID 1844 wrote to memory of 1952 1844 605B.tmp 100 PID 1844 wrote to memory of 1952 1844 605B.tmp 100 PID 1844 wrote to memory of 1952 1844 605B.tmp 100 PID 1952 wrote to memory of 556 1952 2A95.tmp 215 PID 1952 wrote to memory of 556 1952 2A95.tmp 215 PID 1952 wrote to memory of 556 1952 2A95.tmp 215 PID 556 wrote to memory of 4256 556 61B3.tmp 102 PID 556 wrote to memory of 4256 556 61B3.tmp 102 PID 556 wrote to memory of 4256 556 61B3.tmp 102 PID 4256 wrote to memory of 1988 4256 2C5A.tmp 163 PID 4256 wrote to memory of 1988 4256 2C5A.tmp 163 PID 4256 wrote to memory of 1988 4256 2C5A.tmp 163 PID 1988 wrote to memory of 692 1988 4A72.tmp 104 PID 1988 wrote to memory of 692 1988 4A72.tmp 104 PID 1988 wrote to memory of 692 1988 4A72.tmp 104 PID 692 wrote to memory of 5076 692 2DA3.tmp 220 PID 692 wrote to memory of 5076 692 2DA3.tmp 220 PID 692 wrote to memory of 5076 692 2DA3.tmp 220 PID 5076 wrote to memory of 3480 5076 6424.tmp 106 PID 5076 wrote to memory of 3480 5076 6424.tmp 106 PID 5076 wrote to memory of 3480 5076 6424.tmp 106 PID 3480 wrote to memory of 3384 3480 2F0A.tmp 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\43c1913035c08bdc8954e3e4d20a3279_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"C:\Users\Admin\AppData\Local\Temp\1F6A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\216E.tmp"C:\Users\Admin\AppData\Local\Temp\216E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\2248.tmp"C:\Users\Admin\AppData\Local\Temp\2248.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\2333.tmp"C:\Users\Admin\AppData\Local\Temp\2333.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\23DF.tmp"C:\Users\Admin\AppData\Local\Temp\23DF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\246B.tmp"C:\Users\Admin\AppData\Local\Temp\246B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\24E8.tmp"C:\Users\Admin\AppData\Local\Temp\24E8.tmp"8⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\25B3.tmp"C:\Users\Admin\AppData\Local\Temp\25B3.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\265F.tmp"C:\Users\Admin\AppData\Local\Temp\265F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\270B.tmp"C:\Users\Admin\AppData\Local\Temp\270B.tmp"11⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\27B7.tmp"C:\Users\Admin\AppData\Local\Temp\27B7.tmp"12⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\2863.tmp"C:\Users\Admin\AppData\Local\Temp\2863.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\294D.tmp"C:\Users\Admin\AppData\Local\Temp\294D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\29CA.tmp"C:\Users\Admin\AppData\Local\Temp\29CA.tmp"15⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2A95.tmp"C:\Users\Admin\AppData\Local\Temp\2A95.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"C:\Users\Admin\AppData\Local\Temp\2B8F.tmp"17⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"C:\Users\Admin\AppData\Local\Temp\2C5A.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"C:\Users\Admin\AppData\Local\Temp\2CF7.tmp"19⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"C:\Users\Admin\AppData\Local\Temp\2DA3.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"C:\Users\Admin\AppData\Local\Temp\2E6E.tmp"21⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"C:\Users\Admin\AppData\Local\Temp\2F0A.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"C:\Users\Admin\AppData\Local\Temp\2FD5.tmp"23⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3062.tmp"C:\Users\Admin\AppData\Local\Temp\3062.tmp"24⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\30FE.tmp"C:\Users\Admin\AppData\Local\Temp\30FE.tmp"25⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\31C9.tmp"C:\Users\Admin\AppData\Local\Temp\31C9.tmp"26⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"27⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\3330.tmp"C:\Users\Admin\AppData\Local\Temp\3330.tmp"28⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\33DC.tmp"C:\Users\Admin\AppData\Local\Temp\33DC.tmp"29⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3479.tmp"C:\Users\Admin\AppData\Local\Temp\3479.tmp"30⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\3544.tmp"C:\Users\Admin\AppData\Local\Temp\3544.tmp"31⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\35B1.tmp"C:\Users\Admin\AppData\Local\Temp\35B1.tmp"32⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\368C.tmp"C:\Users\Admin\AppData\Local\Temp\368C.tmp"33⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\3747.tmp"C:\Users\Admin\AppData\Local\Temp\3747.tmp"34⤵
- Executes dropped EXE
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\37D4.tmp"C:\Users\Admin\AppData\Local\Temp\37D4.tmp"35⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\3870.tmp"C:\Users\Admin\AppData\Local\Temp\3870.tmp"36⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\38FD.tmp"C:\Users\Admin\AppData\Local\Temp\38FD.tmp"37⤵
- Executes dropped EXE
PID:412 -
C:\Users\Admin\AppData\Local\Temp\397A.tmp"C:\Users\Admin\AppData\Local\Temp\397A.tmp"38⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\3A64.tmp"C:\Users\Admin\AppData\Local\Temp\3A64.tmp"39⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"C:\Users\Admin\AppData\Local\Temp\3AF1.tmp"40⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"C:\Users\Admin\AppData\Local\Temp\3B6E.tmp"41⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"C:\Users\Admin\AppData\Local\Temp\3BEB.tmp"42⤵
- Executes dropped EXE
PID:100 -
C:\Users\Admin\AppData\Local\Temp\3C68.tmp"C:\Users\Admin\AppData\Local\Temp\3C68.tmp"43⤵
- Executes dropped EXE
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"C:\Users\Admin\AppData\Local\Temp\3CE5.tmp"44⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\3D52.tmp"C:\Users\Admin\AppData\Local\Temp\3D52.tmp"45⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"C:\Users\Admin\AppData\Local\Temp\3DCF.tmp"46⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"C:\Users\Admin\AppData\Local\Temp\3E4C.tmp"47⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"C:\Users\Admin\AppData\Local\Temp\3EC9.tmp"48⤵
- Executes dropped EXE
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\3F37.tmp"C:\Users\Admin\AppData\Local\Temp\3F37.tmp"49⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"C:\Users\Admin\AppData\Local\Temp\3FA4.tmp"50⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\4011.tmp"C:\Users\Admin\AppData\Local\Temp\4011.tmp"51⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\407F.tmp"C:\Users\Admin\AppData\Local\Temp\407F.tmp"52⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\40FC.tmp"C:\Users\Admin\AppData\Local\Temp\40FC.tmp"53⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\4169.tmp"C:\Users\Admin\AppData\Local\Temp\4169.tmp"54⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\41E6.tmp"C:\Users\Admin\AppData\Local\Temp\41E6.tmp"55⤵
- Executes dropped EXE
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\4253.tmp"C:\Users\Admin\AppData\Local\Temp\4253.tmp"56⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\42C1.tmp"C:\Users\Admin\AppData\Local\Temp\42C1.tmp"57⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\432E.tmp"C:\Users\Admin\AppData\Local\Temp\432E.tmp"58⤵
- Executes dropped EXE
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\439C.tmp"C:\Users\Admin\AppData\Local\Temp\439C.tmp"59⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\4409.tmp"C:\Users\Admin\AppData\Local\Temp\4409.tmp"60⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\4476.tmp"C:\Users\Admin\AppData\Local\Temp\4476.tmp"61⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\44E4.tmp"C:\Users\Admin\AppData\Local\Temp\44E4.tmp"62⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\4551.tmp"C:\Users\Admin\AppData\Local\Temp\4551.tmp"63⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\45BE.tmp"C:\Users\Admin\AppData\Local\Temp\45BE.tmp"64⤵
- Executes dropped EXE
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\463B.tmp"C:\Users\Admin\AppData\Local\Temp\463B.tmp"65⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\46A9.tmp"C:\Users\Admin\AppData\Local\Temp\46A9.tmp"66⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\4716.tmp"C:\Users\Admin\AppData\Local\Temp\4716.tmp"67⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\4784.tmp"C:\Users\Admin\AppData\Local\Temp\4784.tmp"68⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\4801.tmp"C:\Users\Admin\AppData\Local\Temp\4801.tmp"69⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\48AC.tmp"C:\Users\Admin\AppData\Local\Temp\48AC.tmp"70⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\491A.tmp"C:\Users\Admin\AppData\Local\Temp\491A.tmp"71⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\4987.tmp"C:\Users\Admin\AppData\Local\Temp\4987.tmp"72⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\49F5.tmp"C:\Users\Admin\AppData\Local\Temp\49F5.tmp"73⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\4A72.tmp"C:\Users\Admin\AppData\Local\Temp\4A72.tmp"74⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"C:\Users\Admin\AppData\Local\Temp\4AFE.tmp"75⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"C:\Users\Admin\AppData\Local\Temp\4B6C.tmp"76⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"C:\Users\Admin\AppData\Local\Temp\4BD9.tmp"77⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\4C46.tmp"C:\Users\Admin\AppData\Local\Temp\4C46.tmp"78⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"C:\Users\Admin\AppData\Local\Temp\4CC3.tmp"79⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\4D31.tmp"C:\Users\Admin\AppData\Local\Temp\4D31.tmp"80⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"C:\Users\Admin\AppData\Local\Temp\4D9E.tmp"81⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\4E0B.tmp"C:\Users\Admin\AppData\Local\Temp\4E0B.tmp"82⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\4E88.tmp"C:\Users\Admin\AppData\Local\Temp\4E88.tmp"83⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\4F63.tmp"C:\Users\Admin\AppData\Local\Temp\4F63.tmp"84⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"C:\Users\Admin\AppData\Local\Temp\4FE0.tmp"85⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\504E.tmp"C:\Users\Admin\AppData\Local\Temp\504E.tmp"86⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\50EA.tmp"C:\Users\Admin\AppData\Local\Temp\50EA.tmp"87⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\5157.tmp"C:\Users\Admin\AppData\Local\Temp\5157.tmp"88⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\51D4.tmp"C:\Users\Admin\AppData\Local\Temp\51D4.tmp"89⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\5242.tmp"C:\Users\Admin\AppData\Local\Temp\5242.tmp"90⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\52BF.tmp"C:\Users\Admin\AppData\Local\Temp\52BF.tmp"91⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\532C.tmp"C:\Users\Admin\AppData\Local\Temp\532C.tmp"92⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\53B9.tmp"C:\Users\Admin\AppData\Local\Temp\53B9.tmp"93⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\5426.tmp"C:\Users\Admin\AppData\Local\Temp\5426.tmp"94⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\54A3.tmp"C:\Users\Admin\AppData\Local\Temp\54A3.tmp"95⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\5510.tmp"C:\Users\Admin\AppData\Local\Temp\5510.tmp"96⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\557E.tmp"C:\Users\Admin\AppData\Local\Temp\557E.tmp"97⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\55FB.tmp"C:\Users\Admin\AppData\Local\Temp\55FB.tmp"98⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\5668.tmp"C:\Users\Admin\AppData\Local\Temp\5668.tmp"99⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\56E5.tmp"C:\Users\Admin\AppData\Local\Temp\56E5.tmp"100⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\5752.tmp"C:\Users\Admin\AppData\Local\Temp\5752.tmp"101⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\57CF.tmp"C:\Users\Admin\AppData\Local\Temp\57CF.tmp"102⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\584C.tmp"C:\Users\Admin\AppData\Local\Temp\584C.tmp"103⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\58C9.tmp"C:\Users\Admin\AppData\Local\Temp\58C9.tmp"104⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"105⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\59D3.tmp"C:\Users\Admin\AppData\Local\Temp\59D3.tmp"106⤵
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\5A40.tmp"C:\Users\Admin\AppData\Local\Temp\5A40.tmp"107⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"C:\Users\Admin\AppData\Local\Temp\5ABD.tmp"108⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"C:\Users\Admin\AppData\Local\Temp\5B2B.tmp"109⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"C:\Users\Admin\AppData\Local\Temp\5BA8.tmp"110⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\5C15.tmp"C:\Users\Admin\AppData\Local\Temp\5C15.tmp"111⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\5C83.tmp"C:\Users\Admin\AppData\Local\Temp\5C83.tmp"112⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"C:\Users\Admin\AppData\Local\Temp\5CF0.tmp"113⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"C:\Users\Admin\AppData\Local\Temp\5D7D.tmp"114⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\5DFA.tmp"C:\Users\Admin\AppData\Local\Temp\5DFA.tmp"115⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\5E67.tmp"C:\Users\Admin\AppData\Local\Temp\5E67.tmp"116⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\5F03.tmp"C:\Users\Admin\AppData\Local\Temp\5F03.tmp"117⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\5F71.tmp"C:\Users\Admin\AppData\Local\Temp\5F71.tmp"118⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"C:\Users\Admin\AppData\Local\Temp\5FDE.tmp"119⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\605B.tmp"C:\Users\Admin\AppData\Local\Temp\605B.tmp"120⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\60D8.tmp"C:\Users\Admin\AppData\Local\Temp\60D8.tmp"121⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\6145.tmp"C:\Users\Admin\AppData\Local\Temp\6145.tmp"122⤵PID:3660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-