Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe
-
Size
488KB
-
MD5
36014cbf925d6f6cd6dadf60eb59f276
-
SHA1
f955b4f1a7a6d247cc355bfa33b9cc75a9895b6d
-
SHA256
2e9daac1af9257ba01b6318956c35a6acff1fb94f5c57fceccd15f5e2a8df3fa
-
SHA512
f26c6720e4d2540705c9e5a3ff4433c7caa06354add32909c1d05985bb3d684f0189e3a92578b5ede118f6aaddb6c9c339d1a817874249a8042e4a118ca8bc75
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD76/XbACtWsHegiex8R5NsD+jnwQ6husH3dZ:/U5rCOTeiDYdtWzV7QyspxNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3520 78AA.tmp 3920 7927.tmp 3040 79D3.tmp 3192 7A70.tmp 3664 A930.tmp 1388 7B6A.tmp 1996 7BF6.tmp 3116 7C54.tmp 2280 7D0F.tmp 544 7D8C.tmp 2932 7DFA.tmp 3056 AE60.tmp 4816 7F23.tmp 3508 7FAF.tmp 880 804C.tmp 4328 80E8.tmp 3392 8174.tmp 636 8240.tmp 960 82DC.tmp 568 8472.tmp 720 84FF.tmp 4872 9CFB.tmp 4680 8628.tmp 2188 86A5.tmp 932 9FE9.tmp 4092 87CD.tmp 1748 88C7.tmp 1156 8954.tmp 4352 89D1.tmp 3984 8A6D.tmp 1336 8AFA.tmp 1592 8B87.tmp 4424 8C04.tmp 2152 8C81.tmp 2124 8CFE.tmp 4168 8D8A.tmp 1108 8E07.tmp 4988 8E75.tmp 4580 8EF2.tmp 5012 8F6F.tmp 3692 8FDC.tmp 2012 9069.tmp 4940 90E6.tmp 4832 9163.tmp 3000 91E0.tmp 3904 925D.tmp 1000 AAA7.tmp 2212 9366.tmp 708 949F.tmp 2168 951C.tmp 376 9589.tmp 3056 AE60.tmp 3004 9683.tmp 1272 96F0.tmp 1708 976D.tmp 4056 97EA.tmp 4012 9877.tmp 4656 98F4.tmp 4472 99B0.tmp 4688 9A1D.tmp 2276 9A8A.tmp 4020 9B07.tmp 4448 9B84.tmp 3356 9C01.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3520 4052 2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe 29 PID 4052 wrote to memory of 3520 4052 2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe 29 PID 4052 wrote to memory of 3520 4052 2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe 29 PID 3520 wrote to memory of 3920 3520 78AA.tmp 33 PID 3520 wrote to memory of 3920 3520 78AA.tmp 33 PID 3520 wrote to memory of 3920 3520 78AA.tmp 33 PID 3920 wrote to memory of 3040 3920 7927.tmp 36 PID 3920 wrote to memory of 3040 3920 7927.tmp 36 PID 3920 wrote to memory of 3040 3920 7927.tmp 36 PID 3040 wrote to memory of 3192 3040 79D3.tmp 37 PID 3040 wrote to memory of 3192 3040 79D3.tmp 37 PID 3040 wrote to memory of 3192 3040 79D3.tmp 37 PID 3192 wrote to memory of 3664 3192 7A70.tmp 187 PID 3192 wrote to memory of 3664 3192 7A70.tmp 187 PID 3192 wrote to memory of 3664 3192 7A70.tmp 187 PID 3664 wrote to memory of 1388 3664 A930.tmp 38 PID 3664 wrote to memory of 1388 3664 A930.tmp 38 PID 3664 wrote to memory of 1388 3664 A930.tmp 38 PID 1388 wrote to memory of 1996 1388 7B6A.tmp 39 PID 1388 wrote to memory of 1996 1388 7B6A.tmp 39 PID 1388 wrote to memory of 1996 1388 7B6A.tmp 39 PID 1996 wrote to memory of 3116 1996 7BF6.tmp 40 PID 1996 wrote to memory of 3116 1996 7BF6.tmp 40 PID 1996 wrote to memory of 3116 1996 7BF6.tmp 40 PID 3116 wrote to memory of 2280 3116 7C54.tmp 42 PID 3116 wrote to memory of 2280 3116 7C54.tmp 42 PID 3116 wrote to memory of 2280 3116 7C54.tmp 42 PID 2280 wrote to memory of 544 2280 7D0F.tmp 41 PID 2280 wrote to memory of 544 2280 7D0F.tmp 41 PID 2280 wrote to memory of 544 2280 7D0F.tmp 41 PID 544 wrote to memory of 2932 544 7D8C.tmp 43 PID 544 wrote to memory of 2932 544 7D8C.tmp 43 PID 544 wrote to memory of 2932 544 7D8C.tmp 43 PID 2932 wrote to memory of 3056 2932 7DFA.tmp 198 PID 2932 wrote to memory of 3056 2932 7DFA.tmp 198 PID 2932 wrote to memory of 3056 2932 7DFA.tmp 198 PID 3056 wrote to memory of 4816 3056 AE60.tmp 46 PID 3056 wrote to memory of 4816 3056 AE60.tmp 46 PID 3056 wrote to memory of 4816 3056 AE60.tmp 46 PID 4816 wrote to memory of 3508 4816 7F23.tmp 47 PID 4816 wrote to memory of 3508 4816 7F23.tmp 47 PID 4816 wrote to memory of 3508 4816 7F23.tmp 47 PID 3508 wrote to memory of 880 3508 7FAF.tmp 50 PID 3508 wrote to memory of 880 3508 7FAF.tmp 50 PID 3508 wrote to memory of 880 3508 7FAF.tmp 50 PID 880 wrote to memory of 4328 880 804C.tmp 48 PID 880 wrote to memory of 4328 880 804C.tmp 48 PID 880 wrote to memory of 4328 880 804C.tmp 48 PID 4328 wrote to memory of 3392 4328 80E8.tmp 49 PID 4328 wrote to memory of 3392 4328 80E8.tmp 49 PID 4328 wrote to memory of 3392 4328 80E8.tmp 49 PID 3392 wrote to memory of 636 3392 8174.tmp 51 PID 3392 wrote to memory of 636 3392 8174.tmp 51 PID 3392 wrote to memory of 636 3392 8174.tmp 51 PID 636 wrote to memory of 960 636 8240.tmp 52 PID 636 wrote to memory of 960 636 8240.tmp 52 PID 636 wrote to memory of 960 636 8240.tmp 52 PID 960 wrote to memory of 568 960 82DC.tmp 67 PID 960 wrote to memory of 568 960 82DC.tmp 67 PID 960 wrote to memory of 568 960 82DC.tmp 67 PID 568 wrote to memory of 720 568 8472.tmp 74 PID 568 wrote to memory of 720 568 8472.tmp 74 PID 568 wrote to memory of 720 568 8472.tmp 74 PID 720 wrote to memory of 4872 720 84FF.tmp 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_36014cbf925d6f6cd6dadf60eb59f276_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\78AA.tmp"C:\Users\Admin\AppData\Local\Temp\78AA.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\7927.tmp"C:\Users\Admin\AppData\Local\Temp\7927.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\7A70.tmp"C:\Users\Admin\AppData\Local\Temp\7A70.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"6⤵PID:3664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\7C54.tmp"C:\Users\Admin\AppData\Local\Temp\7C54.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"C:\Users\Admin\AppData\Local\Temp\7D0F.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\7E67.tmp"C:\Users\Admin\AppData\Local\Temp\7E67.tmp"3⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\7F23.tmp"C:\Users\Admin\AppData\Local\Temp\7F23.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"C:\Users\Admin\AppData\Local\Temp\7FAF.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:880
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\80E8.tmp"C:\Users\Admin\AppData\Local\Temp\80E8.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\82DC.tmp"C:\Users\Admin\AppData\Local\Temp\82DC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\8472.tmp"C:\Users\Admin\AppData\Local\Temp\8472.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\84FF.tmp"C:\Users\Admin\AppData\Local\Temp\84FF.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:720
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"1⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"2⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\86A5.tmp"C:\Users\Admin\AppData\Local\Temp\86A5.tmp"3⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\8760.tmp"C:\Users\Admin\AppData\Local\Temp\8760.tmp"4⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\87CD.tmp"C:\Users\Admin\AppData\Local\Temp\87CD.tmp"5⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\88C7.tmp"C:\Users\Admin\AppData\Local\Temp\88C7.tmp"6⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"7⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"8⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"C:\Users\Admin\AppData\Local\Temp\8A6D.tmp"9⤵
- Executes dropped EXE
PID:3984
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8AFA.tmp"C:\Users\Admin\AppData\Local\Temp\8AFA.tmp"1⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\8B87.tmp"C:\Users\Admin\AppData\Local\Temp\8B87.tmp"2⤵
- Executes dropped EXE
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\8C04.tmp"C:\Users\Admin\AppData\Local\Temp\8C04.tmp"1⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\8C81.tmp"C:\Users\Admin\AppData\Local\Temp\8C81.tmp"2⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"C:\Users\Admin\AppData\Local\Temp\8CFE.tmp"3⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"4⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\8E07.tmp"C:\Users\Admin\AppData\Local\Temp\8E07.tmp"5⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\8E75.tmp"C:\Users\Admin\AppData\Local\Temp\8E75.tmp"6⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"C:\Users\Admin\AppData\Local\Temp\8EF2.tmp"7⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"8⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"9⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\9069.tmp"C:\Users\Admin\AppData\Local\Temp\9069.tmp"10⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\90E6.tmp"C:\Users\Admin\AppData\Local\Temp\90E6.tmp"11⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\9163.tmp"C:\Users\Admin\AppData\Local\Temp\9163.tmp"12⤵
- Executes dropped EXE
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"13⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\925D.tmp"C:\Users\Admin\AppData\Local\Temp\925D.tmp"14⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\92E9.tmp"C:\Users\Admin\AppData\Local\Temp\92E9.tmp"15⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\9366.tmp"C:\Users\Admin\AppData\Local\Temp\9366.tmp"16⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\949F.tmp"C:\Users\Admin\AppData\Local\Temp\949F.tmp"17⤵
- Executes dropped EXE
PID:708 -
C:\Users\Admin\AppData\Local\Temp\951C.tmp"C:\Users\Admin\AppData\Local\Temp\951C.tmp"18⤵
- Executes dropped EXE
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\9589.tmp"C:\Users\Admin\AppData\Local\Temp\9589.tmp"19⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\9606.tmp"C:\Users\Admin\AppData\Local\Temp\9606.tmp"20⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\9683.tmp"C:\Users\Admin\AppData\Local\Temp\9683.tmp"21⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"22⤵
- Executes dropped EXE
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\976D.tmp"C:\Users\Admin\AppData\Local\Temp\976D.tmp"23⤵
- Executes dropped EXE
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"24⤵
- Executes dropped EXE
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\9877.tmp"C:\Users\Admin\AppData\Local\Temp\9877.tmp"25⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\98F4.tmp"C:\Users\Admin\AppData\Local\Temp\98F4.tmp"26⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"27⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"28⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"29⤵
- Executes dropped EXE
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"30⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"31⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\9C01.tmp"C:\Users\Admin\AppData\Local\Temp\9C01.tmp"32⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"C:\Users\Admin\AppData\Local\Temp\9C7E.tmp"33⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\9CFB.tmp"C:\Users\Admin\AppData\Local\Temp\9CFB.tmp"34⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\9D69.tmp"C:\Users\Admin\AppData\Local\Temp\9D69.tmp"35⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"36⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\9E82.tmp"C:\Users\Admin\AppData\Local\Temp\9E82.tmp"37⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"38⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"C:\Users\Admin\AppData\Local\Temp\9F6C.tmp"39⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"40⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\A057.tmp"C:\Users\Admin\AppData\Local\Temp\A057.tmp"41⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"42⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"43⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\A19F.tmp"C:\Users\Admin\AppData\Local\Temp\A19F.tmp"44⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"C:\Users\Admin\AppData\Local\Temp\A1FD.tmp"45⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\A25A.tmp"C:\Users\Admin\AppData\Local\Temp\A25A.tmp"46⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"47⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\A325.tmp"C:\Users\Admin\AppData\Local\Temp\A325.tmp"48⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"C:\Users\Admin\AppData\Local\Temp\A3A2.tmp"49⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\A41F.tmp"C:\Users\Admin\AppData\Local\Temp\A41F.tmp"50⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\A49C.tmp"C:\Users\Admin\AppData\Local\Temp\A49C.tmp"51⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"C:\Users\Admin\AppData\Local\Temp\A4FA.tmp"52⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\A577.tmp"C:\Users\Admin\AppData\Local\Temp\A577.tmp"53⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"54⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\A671.tmp"C:\Users\Admin\AppData\Local\Temp\A671.tmp"55⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\A6DF.tmp"C:\Users\Admin\AppData\Local\Temp\A6DF.tmp"56⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"57⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"C:\Users\Admin\AppData\Local\Temp\A7B9.tmp"58⤵PID:256
-
C:\Users\Admin\AppData\Local\Temp\A827.tmp"C:\Users\Admin\AppData\Local\Temp\A827.tmp"59⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"C:\Users\Admin\AppData\Local\Temp\A8B3.tmp"60⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\A930.tmp"C:\Users\Admin\AppData\Local\Temp\A930.tmp"61⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"62⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"C:\Users\Admin\AppData\Local\Temp\AA2A.tmp"63⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"64⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\AB15.tmp"C:\Users\Admin\AppData\Local\Temp\AB15.tmp"65⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"66⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"C:\Users\Admin\AppData\Local\Temp\ABEF.tmp"67⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"68⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"69⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\AD66.tmp"C:\Users\Admin\AppData\Local\Temp\AD66.tmp"70⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"71⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\AE60.tmp"C:\Users\Admin\AppData\Local\Temp\AE60.tmp"72⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"C:\Users\Admin\AppData\Local\Temp\AEBE.tmp"73⤵PID:3768
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"74⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"C:\Users\Admin\AppData\Local\Temp\AFE7.tmp"75⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\B064.tmp"C:\Users\Admin\AppData\Local\Temp\B064.tmp"76⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\B100.tmp"C:\Users\Admin\AppData\Local\Temp\B100.tmp"77⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\B18D.tmp"C:\Users\Admin\AppData\Local\Temp\B18D.tmp"78⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\B277.tmp"C:\Users\Admin\AppData\Local\Temp\B277.tmp"79⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"C:\Users\Admin\AppData\Local\Temp\B2D5.tmp"80⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"C:\Users\Admin\AppData\Local\Temp\B3CF.tmp"81⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"82⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"83⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\B546.tmp"C:\Users\Admin\AppData\Local\Temp\B546.tmp"84⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"C:\Users\Admin\AppData\Local\Temp\B5C3.tmp"85⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\B68E.tmp"C:\Users\Admin\AppData\Local\Temp\B68E.tmp"86⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"87⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"C:\Users\Admin\AppData\Local\Temp\B7A7.tmp"88⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"89⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\BA18.tmp"C:\Users\Admin\AppData\Local\Temp\BA18.tmp"90⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"91⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"C:\Users\Admin\AppData\Local\Temp\BBBE.tmp"92⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"93⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\BD55.tmp"C:\Users\Admin\AppData\Local\Temp\BD55.tmp"94⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"95⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"96⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"97⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"98⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\C091.tmp"C:\Users\Admin\AppData\Local\Temp\C091.tmp"99⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\C15C.tmp"C:\Users\Admin\AppData\Local\Temp\C15C.tmp"100⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"C:\Users\Admin\AppData\Local\Temp\C1D9.tmp"101⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\C294.tmp"C:\Users\Admin\AppData\Local\Temp\C294.tmp"102⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\C321.tmp"C:\Users\Admin\AppData\Local\Temp\C321.tmp"103⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\C39E.tmp"C:\Users\Admin\AppData\Local\Temp\C39E.tmp"104⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\C43A.tmp"C:\Users\Admin\AppData\Local\Temp\C43A.tmp"105⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"C:\Users\Admin\AppData\Local\Temp\C4A8.tmp"106⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\C525.tmp"C:\Users\Admin\AppData\Local\Temp\C525.tmp"107⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\C592.tmp"C:\Users\Admin\AppData\Local\Temp\C592.tmp"108⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"C:\Users\Admin\AppData\Local\Temp\C5FF.tmp"109⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"C:\Users\Admin\AppData\Local\Temp\C6CA.tmp"110⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\C738.tmp"C:\Users\Admin\AppData\Local\Temp\C738.tmp"111⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"C:\Users\Admin\AppData\Local\Temp\C7C4.tmp"112⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\C851.tmp"C:\Users\Admin\AppData\Local\Temp\C851.tmp"113⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"C:\Users\Admin\AppData\Local\Temp\C8ED.tmp"114⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"C:\Users\Admin\AppData\Local\Temp\C9E7.tmp"115⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\CA93.tmp"C:\Users\Admin\AppData\Local\Temp\CA93.tmp"116⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"C:\Users\Admin\AppData\Local\Temp\CB4F.tmp"117⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\CC49.tmp"C:\Users\Admin\AppData\Local\Temp\CC49.tmp"118⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"C:\Users\Admin\AppData\Local\Temp\CCE5.tmp"119⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\CD81.tmp"C:\Users\Admin\AppData\Local\Temp\CD81.tmp"120⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"C:\Users\Admin\AppData\Local\Temp\CDFE.tmp"121⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\CEE9.tmp"C:\Users\Admin\AppData\Local\Temp\CEE9.tmp"122⤵PID:2648
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-