Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 02:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe
-
Size
712KB
-
MD5
40eb66cae3d090c36cfeb18b43342aea
-
SHA1
218a1a7f28879cec3ba062ec5f8912f19c3c3b0c
-
SHA256
505b1c98c32c348802fbabb8338d776a0904b581534f6dc18df5f504f859532f
-
SHA512
9b54514a3658c80cc0cb408a8c70589697a1f8e5cb177038bf0c7abeb7964fe6c2781b22e0ef29619cea167667b72b5f44188df449c0fad98e721a7d3cfda3c6
-
SSDEEP
12288:FU5rCOTeiDB798Bhkbaqk/gX6doyJOwdbFv7hZvOooDwNZdCvq5TJLCvY90D8/L5:FUQOJDBxmIayXYoyJldZOENnCvq5TJLT
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3764 7474.tmp 3128 756E.tmp 4784 761A.tmp 3784 76D6.tmp 368 7AED.tmp 4404 7BB8.tmp 3060 7C35.tmp 3420 93A5.tmp 60 7D2F.tmp 768 TrustedInstaller.exe 5044 7E48.tmp 2420 7ED5.tmp 1408 7F42.tmp 2648 7FBF.tmp 5080 804C.tmp 1572 80B9.tmp 2832 8184.tmp 4824 9942.tmp 908 827E.tmp 2320 831A.tmp 1696 8378.tmp 4736 9B94.tmp 4976 8482.tmp 4292 9D1B.tmp 3040 85D9.tmp 3508 8647.tmp 4856 86B4.tmp 672 8750.tmp 1588 svchost.exe 2640 884A.tmp 4640 8944.tmp 3604 89B2.tmp 2356 A1CE.tmp 924 8AAC.tmp 2728 8B0A.tmp 2512 8B67.tmp 2840 8BF4.tmp 2188 8C90.tmp 1308 8CFE.tmp 4760 8D5B.tmp 1208 8DB9.tmp 4860 8E65.tmp 3156 8EF2.tmp 3572 8F5F.tmp 3832 8FDC.tmp 4784 9059.tmp 4612 90D6.tmp 3400 9153.tmp 1988 91C0.tmp 1692 923D.tmp 3644 92AB.tmp 4708 9328.tmp 3420 93A5.tmp 5108 9412.tmp 4668 947F.tmp 660 950C.tmp 2772 956A.tmp 1364 95E7.tmp 1432 9664.tmp 2400 96E1.tmp 4020 975E.tmp 3196 97DB.tmp 2904 9848.tmp 4788 98C5.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 3764 2348 2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe 87 PID 2348 wrote to memory of 3764 2348 2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe 87 PID 2348 wrote to memory of 3764 2348 2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe 87 PID 3764 wrote to memory of 3128 3764 7474.tmp 88 PID 3764 wrote to memory of 3128 3764 7474.tmp 88 PID 3764 wrote to memory of 3128 3764 7474.tmp 88 PID 3128 wrote to memory of 4784 3128 756E.tmp 89 PID 3128 wrote to memory of 4784 3128 756E.tmp 89 PID 3128 wrote to memory of 4784 3128 756E.tmp 89 PID 4784 wrote to memory of 3784 4784 761A.tmp 90 PID 4784 wrote to memory of 3784 4784 761A.tmp 90 PID 4784 wrote to memory of 3784 4784 761A.tmp 90 PID 3784 wrote to memory of 368 3784 76D6.tmp 91 PID 3784 wrote to memory of 368 3784 76D6.tmp 91 PID 3784 wrote to memory of 368 3784 76D6.tmp 91 PID 368 wrote to memory of 4404 368 7AED.tmp 92 PID 368 wrote to memory of 4404 368 7AED.tmp 92 PID 368 wrote to memory of 4404 368 7AED.tmp 92 PID 4404 wrote to memory of 3060 4404 7BB8.tmp 93 PID 4404 wrote to memory of 3060 4404 7BB8.tmp 93 PID 4404 wrote to memory of 3060 4404 7BB8.tmp 93 PID 3060 wrote to memory of 3420 3060 7C35.tmp 143 PID 3060 wrote to memory of 3420 3060 7C35.tmp 143 PID 3060 wrote to memory of 3420 3060 7C35.tmp 143 PID 3420 wrote to memory of 60 3420 93A5.tmp 95 PID 3420 wrote to memory of 60 3420 93A5.tmp 95 PID 3420 wrote to memory of 60 3420 93A5.tmp 95 PID 60 wrote to memory of 768 60 7D2F.tmp 146 PID 60 wrote to memory of 768 60 7D2F.tmp 146 PID 60 wrote to memory of 768 60 7D2F.tmp 146 PID 768 wrote to memory of 5044 768 TrustedInstaller.exe 97 PID 768 wrote to memory of 5044 768 TrustedInstaller.exe 97 PID 768 wrote to memory of 5044 768 TrustedInstaller.exe 97 PID 5044 wrote to memory of 2420 5044 7E48.tmp 99 PID 5044 wrote to memory of 2420 5044 7E48.tmp 99 PID 5044 wrote to memory of 2420 5044 7E48.tmp 99 PID 2420 wrote to memory of 1408 2420 7ED5.tmp 98 PID 2420 wrote to memory of 1408 2420 7ED5.tmp 98 PID 2420 wrote to memory of 1408 2420 7ED5.tmp 98 PID 1408 wrote to memory of 2648 1408 7F42.tmp 100 PID 1408 wrote to memory of 2648 1408 7F42.tmp 100 PID 1408 wrote to memory of 2648 1408 7F42.tmp 100 PID 2648 wrote to memory of 5080 2648 7FBF.tmp 101 PID 2648 wrote to memory of 5080 2648 7FBF.tmp 101 PID 2648 wrote to memory of 5080 2648 7FBF.tmp 101 PID 5080 wrote to memory of 1572 5080 804C.tmp 102 PID 5080 wrote to memory of 1572 5080 804C.tmp 102 PID 5080 wrote to memory of 1572 5080 804C.tmp 102 PID 1572 wrote to memory of 2832 1572 80B9.tmp 103 PID 1572 wrote to memory of 2832 1572 80B9.tmp 103 PID 1572 wrote to memory of 2832 1572 80B9.tmp 103 PID 2832 wrote to memory of 4824 2832 8184.tmp 156 PID 2832 wrote to memory of 4824 2832 8184.tmp 156 PID 2832 wrote to memory of 4824 2832 8184.tmp 156 PID 4824 wrote to memory of 908 4824 9942.tmp 125 PID 4824 wrote to memory of 908 4824 9942.tmp 125 PID 4824 wrote to memory of 908 4824 9942.tmp 125 PID 908 wrote to memory of 2320 908 827E.tmp 105 PID 908 wrote to memory of 2320 908 827E.tmp 105 PID 908 wrote to memory of 2320 908 827E.tmp 105 PID 2320 wrote to memory of 1696 2320 831A.tmp 106 PID 2320 wrote to memory of 1696 2320 831A.tmp 106 PID 2320 wrote to memory of 1696 2320 831A.tmp 106 PID 1696 wrote to memory of 4736 1696 8378.tmp 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_40eb66cae3d090c36cfeb18b43342aea_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\7474.tmp"C:\Users\Admin\AppData\Local\Temp\7474.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\756E.tmp"C:\Users\Admin\AppData\Local\Temp\756E.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\76D6.tmp"C:\Users\Admin\AppData\Local\Temp\76D6.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\7BB8.tmp"C:\Users\Admin\AppData\Local\Temp\7BB8.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\7C35.tmp"C:\Users\Admin\AppData\Local\Temp\7C35.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"9⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"C:\Users\Admin\AppData\Local\Temp\7D2F.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"C:\Users\Admin\AppData\Local\Temp\7DBB.tmp"11⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"C:\Users\Admin\AppData\Local\Temp\7ED5.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7F42.tmp"C:\Users\Admin\AppData\Local\Temp\7F42.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\80B9.tmp"C:\Users\Admin\AppData\Local\Temp\80B9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\8184.tmp"C:\Users\Admin\AppData\Local\Temp\8184.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\8220.tmp"C:\Users\Admin\AppData\Local\Temp\8220.tmp"6⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\827E.tmp"C:\Users\Admin\AppData\Local\Temp\827E.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\831A.tmp"C:\Users\Admin\AppData\Local\Temp\831A.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\8378.tmp"C:\Users\Admin\AppData\Local\Temp\8378.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"3⤵PID:4736
-
-
-
C:\Users\Admin\AppData\Local\Temp\84EF.tmp"C:\Users\Admin\AppData\Local\Temp\84EF.tmp"1⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\85D9.tmp"C:\Users\Admin\AppData\Local\Temp\85D9.tmp"2⤵
- Executes dropped EXE
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"1⤵
- Executes dropped EXE
PID:4976
-
C:\Users\Admin\AppData\Local\Temp\8647.tmp"C:\Users\Admin\AppData\Local\Temp\8647.tmp"1⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\86B4.tmp"C:\Users\Admin\AppData\Local\Temp\86B4.tmp"2⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\8750.tmp"C:\Users\Admin\AppData\Local\Temp\8750.tmp"3⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"4⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\884A.tmp"C:\Users\Admin\AppData\Local\Temp\884A.tmp"5⤵
- Executes dropped EXE
PID:2640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\89B2.tmp"C:\Users\Admin\AppData\Local\Temp\89B2.tmp"1⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"2⤵PID:2356
-
-
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"1⤵
- Executes dropped EXE
PID:4640
-
C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"1⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"2⤵
- Executes dropped EXE
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\8B67.tmp"C:\Users\Admin\AppData\Local\Temp\8B67.tmp"3⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"4⤵
- Executes dropped EXE
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\8C90.tmp"C:\Users\Admin\AppData\Local\Temp\8C90.tmp"5⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"6⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"C:\Users\Admin\AppData\Local\Temp\8D5B.tmp"7⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\8DB9.tmp"C:\Users\Admin\AppData\Local\Temp\8DB9.tmp"8⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\8E65.tmp"C:\Users\Admin\AppData\Local\Temp\8E65.tmp"9⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"10⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"C:\Users\Admin\AppData\Local\Temp\8F5F.tmp"11⤵
- Executes dropped EXE
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"12⤵
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\9059.tmp"C:\Users\Admin\AppData\Local\Temp\9059.tmp"13⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\90D6.tmp"C:\Users\Admin\AppData\Local\Temp\90D6.tmp"14⤵
- Executes dropped EXE
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\9153.tmp"C:\Users\Admin\AppData\Local\Temp\9153.tmp"15⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\91C0.tmp"C:\Users\Admin\AppData\Local\Temp\91C0.tmp"16⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\923D.tmp"C:\Users\Admin\AppData\Local\Temp\923D.tmp"17⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\92AB.tmp"C:\Users\Admin\AppData\Local\Temp\92AB.tmp"18⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\9328.tmp"C:\Users\Admin\AppData\Local\Temp\9328.tmp"19⤵
- Executes dropped EXE
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\93A5.tmp"C:\Users\Admin\AppData\Local\Temp\93A5.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\9412.tmp"C:\Users\Admin\AppData\Local\Temp\9412.tmp"21⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\947F.tmp"C:\Users\Admin\AppData\Local\Temp\947F.tmp"22⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\950C.tmp"C:\Users\Admin\AppData\Local\Temp\950C.tmp"23⤵
- Executes dropped EXE
PID:660 -
C:\Users\Admin\AppData\Local\Temp\956A.tmp"C:\Users\Admin\AppData\Local\Temp\956A.tmp"24⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\95E7.tmp"C:\Users\Admin\AppData\Local\Temp\95E7.tmp"25⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\9664.tmp"C:\Users\Admin\AppData\Local\Temp\9664.tmp"26⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\96E1.tmp"C:\Users\Admin\AppData\Local\Temp\96E1.tmp"27⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\975E.tmp"C:\Users\Admin\AppData\Local\Temp\975E.tmp"28⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\97DB.tmp"C:\Users\Admin\AppData\Local\Temp\97DB.tmp"29⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\9848.tmp"C:\Users\Admin\AppData\Local\Temp\9848.tmp"30⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"31⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"32⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\99A0.tmp"C:\Users\Admin\AppData\Local\Temp\99A0.tmp"33⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"34⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"35⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"36⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\9B94.tmp"C:\Users\Admin\AppData\Local\Temp\9B94.tmp"37⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\9C11.tmp"C:\Users\Admin\AppData\Local\Temp\9C11.tmp"38⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"C:\Users\Admin\AppData\Local\Temp\9C8E.tmp"39⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"40⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\9D78.tmp"C:\Users\Admin\AppData\Local\Temp\9D78.tmp"41⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"C:\Users\Admin\AppData\Local\Temp\9DD6.tmp"42⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\9E63.tmp"C:\Users\Admin\AppData\Local\Temp\9E63.tmp"43⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"44⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"C:\Users\Admin\AppData\Local\Temp\9F5D.tmp"45⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"C:\Users\Admin\AppData\Local\Temp\9FDA.tmp"46⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\A057.tmp"C:\Users\Admin\AppData\Local\Temp\A057.tmp"47⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"C:\Users\Admin\AppData\Local\Temp\A0C4.tmp"48⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\A170.tmp"C:\Users\Admin\AppData\Local\Temp\A170.tmp"49⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"C:\Users\Admin\AppData\Local\Temp\A1CE.tmp"50⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"51⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"C:\Users\Admin\AppData\Local\Temp\A2C8.tmp"52⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\A335.tmp"C:\Users\Admin\AppData\Local\Temp\A335.tmp"53⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"54⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\A46E.tmp"C:\Users\Admin\AppData\Local\Temp\A46E.tmp"55⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\A587.tmp"C:\Users\Admin\AppData\Local\Temp\A587.tmp"56⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\A662.tmp"C:\Users\Admin\AppData\Local\Temp\A662.tmp"57⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\A79A.tmp"C:\Users\Admin\AppData\Local\Temp\A79A.tmp"58⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\A846.tmp"C:\Users\Admin\AppData\Local\Temp\A846.tmp"59⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"60⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"61⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"C:\Users\Admin\AppData\Local\Temp\AAF5.tmp"62⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"63⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"C:\Users\Admin\AppData\Local\Temp\ACCA.tmp"64⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\AD66.tmp"C:\Users\Admin\AppData\Local\Temp\AD66.tmp"65⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"C:\Users\Admin\AppData\Local\Temp\ADC4.tmp"66⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\AE51.tmp"C:\Users\Admin\AppData\Local\Temp\AE51.tmp"67⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"68⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"C:\Users\Admin\AppData\Local\Temp\AF6A.tmp"69⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"C:\Users\Admin\AppData\Local\Temp\AFD7.tmp"70⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\B054.tmp"C:\Users\Admin\AppData\Local\Temp\B054.tmp"71⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\B0C2.tmp"C:\Users\Admin\AppData\Local\Temp\B0C2.tmp"72⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\B13F.tmp"C:\Users\Admin\AppData\Local\Temp\B13F.tmp"73⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"C:\Users\Admin\AppData\Local\Temp\B1BC.tmp"74⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\B239.tmp"C:\Users\Admin\AppData\Local\Temp\B239.tmp"75⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\B297.tmp"C:\Users\Admin\AppData\Local\Temp\B297.tmp"76⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\B304.tmp"C:\Users\Admin\AppData\Local\Temp\B304.tmp"77⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"78⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"79⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"80⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"81⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"82⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"83⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\B621.tmp"C:\Users\Admin\AppData\Local\Temp\B621.tmp"84⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"85⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\B70B.tmp"C:\Users\Admin\AppData\Local\Temp\B70B.tmp"86⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\B779.tmp"C:\Users\Admin\AppData\Local\Temp\B779.tmp"87⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"88⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\B863.tmp"C:\Users\Admin\AppData\Local\Temp\B863.tmp"89⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\B8FF.tmp"C:\Users\Admin\AppData\Local\Temp\B8FF.tmp"90⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\B97C.tmp"C:\Users\Admin\AppData\Local\Temp\B97C.tmp"91⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"92⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\BA57.tmp"C:\Users\Admin\AppData\Local\Temp\BA57.tmp"93⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"C:\Users\Admin\AppData\Local\Temp\BAC4.tmp"94⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\BB51.tmp"C:\Users\Admin\AppData\Local\Temp\BB51.tmp"95⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"C:\Users\Admin\AppData\Local\Temp\BBCE.tmp"96⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"C:\Users\Admin\AppData\Local\Temp\BC3B.tmp"97⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"C:\Users\Admin\AppData\Local\Temp\BCB8.tmp"98⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\BD45.tmp"C:\Users\Admin\AppData\Local\Temp\BD45.tmp"99⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\BDC2.tmp"C:\Users\Admin\AppData\Local\Temp\BDC2.tmp"100⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"C:\Users\Admin\AppData\Local\Temp\BE2F.tmp"101⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"C:\Users\Admin\AppData\Local\Temp\BE9D.tmp"102⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"C:\Users\Admin\AppData\Local\Temp\BF1A.tmp"103⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\BF97.tmp"C:\Users\Admin\AppData\Local\Temp\BF97.tmp"104⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"105⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"106⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"C:\Users\Admin\AppData\Local\Temp\C0EE.tmp"107⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\C16B.tmp"C:\Users\Admin\AppData\Local\Temp\C16B.tmp"108⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"C:\Users\Admin\AppData\Local\Temp\C1E8.tmp"109⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\C265.tmp"C:\Users\Admin\AppData\Local\Temp\C265.tmp"110⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"C:\Users\Admin\AppData\Local\Temp\C2E2.tmp"111⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\C35F.tmp"C:\Users\Admin\AppData\Local\Temp\C35F.tmp"112⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"C:\Users\Admin\AppData\Local\Temp\C3CD.tmp"113⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\C44A.tmp"C:\Users\Admin\AppData\Local\Temp\C44A.tmp"114⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"115⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"C:\Users\Admin\AppData\Local\Temp\C5C1.tmp"116⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\C65D.tmp"C:\Users\Admin\AppData\Local\Temp\C65D.tmp"117⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"C:\Users\Admin\AppData\Local\Temp\C7A5.tmp"118⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\CA26.tmp"C:\Users\Admin\AppData\Local\Temp\CA26.tmp"119⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\CA84.tmp"C:\Users\Admin\AppData\Local\Temp\CA84.tmp"120⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"121⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\CD43.tmp"C:\Users\Admin\AppData\Local\Temp\CD43.tmp"122⤵PID:2364
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-