Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 00:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe
-
Size
486KB
-
MD5
a5d5d9c7ef9ab0dc047bd6e2d1d4b378
-
SHA1
567448b5b7465af592b98cba584f8050a6f7a205
-
SHA256
3f2799fe35613fa7c27b9015f6490d92587e29a69ccdff151e1ce2c015f5e1d2
-
SHA512
0cd7fb9f78f264e2c3369e4a481b08a33f42e19352d5bd18169eba07a30d0baae5c9d0ddf1fd91526fd7bf125e5c17ebf79ee3dc9c9d67279dd4abbd109a495c
-
SSDEEP
12288:/U5rCOTeiDTCadK+LE+4Hx1pBkRXOvhx4NZ:/UQOJDT3Hsfp285mN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 756 6699.tmp 2376 4B70.tmp 2788 4BCE.tmp 3356 4C1C.tmp 804 4C7A.tmp 4512 4CC8.tmp 3864 4D26.tmp 1656 4D84.tmp 3620 4DD2.tmp 3736 4E20.tmp 4636 69E5.tmp 3940 4EBC.tmp 4756 5B9D.tmp 1016 4F68.tmp 5088 5D33.tmp 2924 5014.tmp 2152 6DBE.tmp 1700 50C0.tmp 4120 512D.tmp 3076 518B.tmp 4452 51D9.tmp 4796 mousocoreworker.exe 3932 5294.tmp 3968 52E3.tmp 4720 734B.tmp 3464 6F92.tmp 2332 6254.tmp 696 542B.tmp 3496 5488.tmp 924 70CB.tmp 3784 5544.tmp 4456 72AF.tmp 2204 55F0.tmp 3924 739A.tmp 3448 56AB.tmp 4428 65FD.tmp 3268 5757.tmp 4860 57A5.tmp 3260 57F3.tmp 1624 6774.tmp 2868 67C2.tmp 1764 6810.tmp 908 592C.tmp 5104 597A.tmp 2676 59C8.tmp 3620 4DD2.tmp 4516 5A64.tmp 4376 5AB3.tmp 540 5B01.tmp 4400 5B4F.tmp 4756 5B9D.tmp 5052 5BEB.tmp 436 5C49.tmp 3500 5C97.tmp 1832 5CE5.tmp 5088 5D33.tmp 5044 5D81.tmp 4228 5DC0.tmp 3516 5E0E.tmp 752 5E5C.tmp 5076 5EAA.tmp 1100 5EE9.tmp 440 5F37.tmp 4940 5F85.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 756 1516 2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe 142 PID 1516 wrote to memory of 756 1516 2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe 142 PID 1516 wrote to memory of 756 1516 2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe 142 PID 756 wrote to memory of 2376 756 6699.tmp 68 PID 756 wrote to memory of 2376 756 6699.tmp 68 PID 756 wrote to memory of 2376 756 6699.tmp 68 PID 2376 wrote to memory of 2788 2376 4B70.tmp 161 PID 2376 wrote to memory of 2788 2376 4B70.tmp 161 PID 2376 wrote to memory of 2788 2376 4B70.tmp 161 PID 2788 wrote to memory of 3356 2788 4BCE.tmp 160 PID 2788 wrote to memory of 3356 2788 4BCE.tmp 160 PID 2788 wrote to memory of 3356 2788 4BCE.tmp 160 PID 3356 wrote to memory of 804 3356 4C1C.tmp 159 PID 3356 wrote to memory of 804 3356 4C1C.tmp 159 PID 3356 wrote to memory of 804 3356 4C1C.tmp 159 PID 804 wrote to memory of 4512 804 4C7A.tmp 158 PID 804 wrote to memory of 4512 804 4C7A.tmp 158 PID 804 wrote to memory of 4512 804 4C7A.tmp 158 PID 4512 wrote to memory of 3864 4512 4CC8.tmp 157 PID 4512 wrote to memory of 3864 4512 4CC8.tmp 157 PID 4512 wrote to memory of 3864 4512 4CC8.tmp 157 PID 3864 wrote to memory of 1656 3864 4D26.tmp 156 PID 3864 wrote to memory of 1656 3864 4D26.tmp 156 PID 3864 wrote to memory of 1656 3864 4D26.tmp 156 PID 1656 wrote to memory of 3620 1656 4D84.tmp 155 PID 1656 wrote to memory of 3620 1656 4D84.tmp 155 PID 1656 wrote to memory of 3620 1656 4D84.tmp 155 PID 3620 wrote to memory of 3736 3620 4DD2.tmp 153 PID 3620 wrote to memory of 3736 3620 4DD2.tmp 153 PID 3620 wrote to memory of 3736 3620 4DD2.tmp 153 PID 3736 wrote to memory of 4636 3736 4E20.tmp 192 PID 3736 wrote to memory of 4636 3736 4E20.tmp 192 PID 3736 wrote to memory of 4636 3736 4E20.tmp 192 PID 4636 wrote to memory of 3940 4636 69E5.tmp 151 PID 4636 wrote to memory of 3940 4636 69E5.tmp 151 PID 4636 wrote to memory of 3940 4636 69E5.tmp 151 PID 3940 wrote to memory of 4756 3940 4EBC.tmp 96 PID 3940 wrote to memory of 4756 3940 4EBC.tmp 96 PID 3940 wrote to memory of 4756 3940 4EBC.tmp 96 PID 4756 wrote to memory of 1016 4756 5B9D.tmp 150 PID 4756 wrote to memory of 1016 4756 5B9D.tmp 150 PID 4756 wrote to memory of 1016 4756 5B9D.tmp 150 PID 1016 wrote to memory of 5088 1016 4F68.tmp 98 PID 1016 wrote to memory of 5088 1016 4F68.tmp 98 PID 1016 wrote to memory of 5088 1016 4F68.tmp 98 PID 5088 wrote to memory of 2924 5088 5D33.tmp 147 PID 5088 wrote to memory of 2924 5088 5D33.tmp 147 PID 5088 wrote to memory of 2924 5088 5D33.tmp 147 PID 2924 wrote to memory of 2152 2924 5014.tmp 204 PID 2924 wrote to memory of 2152 2924 5014.tmp 204 PID 2924 wrote to memory of 2152 2924 5014.tmp 204 PID 2152 wrote to memory of 1700 2152 6DBE.tmp 145 PID 2152 wrote to memory of 1700 2152 6DBE.tmp 145 PID 2152 wrote to memory of 1700 2152 6DBE.tmp 145 PID 1700 wrote to memory of 4120 1700 50C0.tmp 144 PID 1700 wrote to memory of 4120 1700 50C0.tmp 144 PID 1700 wrote to memory of 4120 1700 50C0.tmp 144 PID 4120 wrote to memory of 3076 4120 512D.tmp 143 PID 4120 wrote to memory of 3076 4120 512D.tmp 143 PID 4120 wrote to memory of 3076 4120 512D.tmp 143 PID 3076 wrote to memory of 4452 3076 518B.tmp 141 PID 3076 wrote to memory of 4452 3076 518B.tmp 141 PID 3076 wrote to memory of 4452 3076 518B.tmp 141 PID 4452 wrote to memory of 4796 4452 51D9.tmp 211
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_a5d5d9c7ef9ab0dc047bd6e2d1d4b378_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\4B13.tmp"C:\Users\Admin\AppData\Local\Temp\4B13.tmp"2⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\4B70.tmp"C:\Users\Admin\AppData\Local\Temp\4B70.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\4BCE.tmp"C:\Users\Admin\AppData\Local\Temp\4BCE.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"1⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"C:\Users\Admin\AppData\Local\Temp\5BEB.tmp"2⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\5C49.tmp"C:\Users\Admin\AppData\Local\Temp\5C49.tmp"3⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"4⤵
- Executes dropped EXE
PID:3500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"C:\Users\Admin\AppData\Local\Temp\4FB6.tmp"1⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\5227.tmp"C:\Users\Admin\AppData\Local\Temp\5227.tmp"1⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\5294.tmp"C:\Users\Admin\AppData\Local\Temp\5294.tmp"2⤵
- Executes dropped EXE
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\53DD.tmp"C:\Users\Admin\AppData\Local\Temp\53DD.tmp"1⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\5488.tmp"C:\Users\Admin\AppData\Local\Temp\5488.tmp"1⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\54E6.tmp"C:\Users\Admin\AppData\Local\Temp\54E6.tmp"2⤵PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\55F0.tmp"C:\Users\Admin\AppData\Local\Temp\55F0.tmp"1⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\564E.tmp"C:\Users\Admin\AppData\Local\Temp\564E.tmp"2⤵PID:3924
-
C:\Users\Admin\AppData\Local\Temp\56AB.tmp"C:\Users\Admin\AppData\Local\Temp\56AB.tmp"3⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\56F9.tmp"C:\Users\Admin\AppData\Local\Temp\56F9.tmp"4⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\5757.tmp"C:\Users\Admin\AppData\Local\Temp\5757.tmp"5⤵
- Executes dropped EXE
PID:3268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\55A2.tmp"C:\Users\Admin\AppData\Local\Temp\55A2.tmp"1⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"1⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\5842.tmp"C:\Users\Admin\AppData\Local\Temp\5842.tmp"2⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\5890.tmp"C:\Users\Admin\AppData\Local\Temp\5890.tmp"3⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\58DE.tmp"C:\Users\Admin\AppData\Local\Temp\58DE.tmp"4⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\592C.tmp"C:\Users\Admin\AppData\Local\Temp\592C.tmp"5⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\597A.tmp"C:\Users\Admin\AppData\Local\Temp\597A.tmp"6⤵
- Executes dropped EXE
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\59C8.tmp"C:\Users\Admin\AppData\Local\Temp\59C8.tmp"7⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\5A16.tmp"C:\Users\Admin\AppData\Local\Temp\5A16.tmp"8⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\5A64.tmp"C:\Users\Admin\AppData\Local\Temp\5A64.tmp"9⤵
- Executes dropped EXE
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\4E20.tmp"C:\Users\Admin\AppData\Local\Temp\4E20.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"1⤵
- Executes dropped EXE
PID:4860
-
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"1⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\5B01.tmp"C:\Users\Admin\AppData\Local\Temp\5B01.tmp"2⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\5B4F.tmp"C:\Users\Admin\AppData\Local\Temp\5B4F.tmp"3⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\5B9D.tmp"C:\Users\Admin\AppData\Local\Temp\5B9D.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"C:\Users\Admin\AppData\Local\Temp\5CE5.tmp"1⤵
- Executes dropped EXE
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\5D33.tmp"C:\Users\Admin\AppData\Local\Temp\5D33.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\5D81.tmp"C:\Users\Admin\AppData\Local\Temp\5D81.tmp"3⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"C:\Users\Admin\AppData\Local\Temp\5DC0.tmp"4⤵
- Executes dropped EXE
PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\5014.tmp"C:\Users\Admin\AppData\Local\Temp\5014.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"C:\Users\Admin\AppData\Local\Temp\5E0E.tmp"1⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"C:\Users\Admin\AppData\Local\Temp\5E5C.tmp"2⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"C:\Users\Admin\AppData\Local\Temp\5EAA.tmp"3⤵
- Executes dropped EXE
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"1⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"2⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"3⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"4⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"5⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\606F.tmp"C:\Users\Admin\AppData\Local\Temp\606F.tmp"6⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\60CD.tmp"C:\Users\Admin\AppData\Local\Temp\60CD.tmp"7⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\611B.tmp"C:\Users\Admin\AppData\Local\Temp\611B.tmp"8⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\6169.tmp"C:\Users\Admin\AppData\Local\Temp\6169.tmp"9⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\61B7.tmp"C:\Users\Admin\AppData\Local\Temp\61B7.tmp"10⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\6206.tmp"C:\Users\Admin\AppData\Local\Temp\6206.tmp"11⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\6254.tmp"C:\Users\Admin\AppData\Local\Temp\6254.tmp"12⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\62B1.tmp"C:\Users\Admin\AppData\Local\Temp\62B1.tmp"13⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\6300.tmp"C:\Users\Admin\AppData\Local\Temp\6300.tmp"14⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\634E.tmp"C:\Users\Admin\AppData\Local\Temp\634E.tmp"15⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\639C.tmp"C:\Users\Admin\AppData\Local\Temp\639C.tmp"16⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\63EA.tmp"C:\Users\Admin\AppData\Local\Temp\63EA.tmp"17⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\6438.tmp"C:\Users\Admin\AppData\Local\Temp\6438.tmp"18⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"19⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\64E4.tmp"C:\Users\Admin\AppData\Local\Temp\64E4.tmp"20⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\6532.tmp"C:\Users\Admin\AppData\Local\Temp\6532.tmp"21⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\6580.tmp"C:\Users\Admin\AppData\Local\Temp\6580.tmp"22⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\65BF.tmp"C:\Users\Admin\AppData\Local\Temp\65BF.tmp"23⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\65FD.tmp"C:\Users\Admin\AppData\Local\Temp\65FD.tmp"24⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\664B.tmp"C:\Users\Admin\AppData\Local\Temp\664B.tmp"25⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\6699.tmp"C:\Users\Admin\AppData\Local\Temp\6699.tmp"26⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\66E8.tmp"C:\Users\Admin\AppData\Local\Temp\66E8.tmp"27⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\6736.tmp"C:\Users\Admin\AppData\Local\Temp\6736.tmp"28⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"29⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\67C2.tmp"C:\Users\Admin\AppData\Local\Temp\67C2.tmp"30⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"31⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"32⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"33⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"34⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"35⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"36⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\69E5.tmp"C:\Users\Admin\AppData\Local\Temp\69E5.tmp"37⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\6A43.tmp"C:\Users\Admin\AppData\Local\Temp\6A43.tmp"38⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\6A91.tmp"C:\Users\Admin\AppData\Local\Temp\6A91.tmp"39⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"C:\Users\Admin\AppData\Local\Temp\6ADF.tmp"40⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"41⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"C:\Users\Admin\AppData\Local\Temp\6B8B.tmp"42⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"C:\Users\Admin\AppData\Local\Temp\6BD9.tmp"43⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\6C27.tmp"C:\Users\Admin\AppData\Local\Temp\6C27.tmp"44⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\6C75.tmp"C:\Users\Admin\AppData\Local\Temp\6C75.tmp"45⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"C:\Users\Admin\AppData\Local\Temp\6CC4.tmp"46⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\6D12.tmp"C:\Users\Admin\AppData\Local\Temp\6D12.tmp"47⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"C:\Users\Admin\AppData\Local\Temp\6D6F.tmp"48⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\6DBE.tmp"C:\Users\Admin\AppData\Local\Temp\6DBE.tmp"49⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"C:\Users\Admin\AppData\Local\Temp\6E0C.tmp"50⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"C:\Users\Admin\AppData\Local\Temp\6E5A.tmp"51⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"52⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"C:\Users\Admin\AppData\Local\Temp\6EF6.tmp"53⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\6F44.tmp"C:\Users\Admin\AppData\Local\Temp\6F44.tmp"54⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\6F92.tmp"C:\Users\Admin\AppData\Local\Temp\6F92.tmp"55⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"56⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\702F.tmp"C:\Users\Admin\AppData\Local\Temp\702F.tmp"57⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\707D.tmp"C:\Users\Admin\AppData\Local\Temp\707D.tmp"58⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\70CB.tmp"C:\Users\Admin\AppData\Local\Temp\70CB.tmp"59⤵
- Executes dropped EXE
PID:924 -
C:\Users\Admin\AppData\Local\Temp\7119.tmp"C:\Users\Admin\AppData\Local\Temp\7119.tmp"60⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"61⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"62⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\7213.tmp"C:\Users\Admin\AppData\Local\Temp\7213.tmp"63⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"64⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\72AF.tmp"C:\Users\Admin\AppData\Local\Temp\72AF.tmp"65⤵
- Executes dropped EXE
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\72FD.tmp"C:\Users\Admin\AppData\Local\Temp\72FD.tmp"66⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\734B.tmp"C:\Users\Admin\AppData\Local\Temp\734B.tmp"67⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\739A.tmp"C:\Users\Admin\AppData\Local\Temp\739A.tmp"68⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"69⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\7445.tmp"C:\Users\Admin\AppData\Local\Temp\7445.tmp"70⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\754F.tmp"C:\Users\Admin\AppData\Local\Temp\754F.tmp"71⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\762A.tmp"C:\Users\Admin\AppData\Local\Temp\762A.tmp"72⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\7688.tmp"C:\Users\Admin\AppData\Local\Temp\7688.tmp"73⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\7753.tmp"C:\Users\Admin\AppData\Local\Temp\7753.tmp"74⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\77C0.tmp"C:\Users\Admin\AppData\Local\Temp\77C0.tmp"75⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\782D.tmp"C:\Users\Admin\AppData\Local\Temp\782D.tmp"76⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"77⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\79F3.tmp"C:\Users\Admin\AppData\Local\Temp\79F3.tmp"78⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\7A60.tmp"C:\Users\Admin\AppData\Local\Temp\7A60.tmp"79⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\7ACD.tmp"C:\Users\Admin\AppData\Local\Temp\7ACD.tmp"80⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"81⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\7B89.tmp"C:\Users\Admin\AppData\Local\Temp\7B89.tmp"82⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"C:\Users\Admin\AppData\Local\Temp\7BD7.tmp"83⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\7C83.tmp"C:\Users\Admin\AppData\Local\Temp\7C83.tmp"84⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"C:\Users\Admin\AppData\Local\Temp\7CE1.tmp"85⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"86⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\7E48.tmp"C:\Users\Admin\AppData\Local\Temp\7E48.tmp"87⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\7F23.tmp"C:\Users\Admin\AppData\Local\Temp\7F23.tmp"88⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\7F90.tmp"C:\Users\Admin\AppData\Local\Temp\7F90.tmp"89⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"90⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\802C.tmp"C:\Users\Admin\AppData\Local\Temp\802C.tmp"91⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\808A.tmp"C:\Users\Admin\AppData\Local\Temp\808A.tmp"92⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\80D8.tmp"C:\Users\Admin\AppData\Local\Temp\80D8.tmp"93⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\8126.tmp"C:\Users\Admin\AppData\Local\Temp\8126.tmp"94⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\8184.tmp"C:\Users\Admin\AppData\Local\Temp\8184.tmp"95⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\81D2.tmp"C:\Users\Admin\AppData\Local\Temp\81D2.tmp"96⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\8230.tmp"C:\Users\Admin\AppData\Local\Temp\8230.tmp"97⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\827E.tmp"C:\Users\Admin\AppData\Local\Temp\827E.tmp"98⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\82CC.tmp"C:\Users\Admin\AppData\Local\Temp\82CC.tmp"99⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\832A.tmp"C:\Users\Admin\AppData\Local\Temp\832A.tmp"100⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\8388.tmp"C:\Users\Admin\AppData\Local\Temp\8388.tmp"101⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\83E5.tmp"C:\Users\Admin\AppData\Local\Temp\83E5.tmp"102⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\8434.tmp"C:\Users\Admin\AppData\Local\Temp\8434.tmp"103⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"104⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\84DF.tmp"C:\Users\Admin\AppData\Local\Temp\84DF.tmp"105⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\852E.tmp"C:\Users\Admin\AppData\Local\Temp\852E.tmp"106⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\857C.tmp"C:\Users\Admin\AppData\Local\Temp\857C.tmp"107⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\85D9.tmp"C:\Users\Admin\AppData\Local\Temp\85D9.tmp"108⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"109⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\8676.tmp"C:\Users\Admin\AppData\Local\Temp\8676.tmp"110⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\86D3.tmp"C:\Users\Admin\AppData\Local\Temp\86D3.tmp"111⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\8731.tmp"C:\Users\Admin\AppData\Local\Temp\8731.tmp"112⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\878F.tmp"C:\Users\Admin\AppData\Local\Temp\878F.tmp"113⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\87ED.tmp"C:\Users\Admin\AppData\Local\Temp\87ED.tmp"114⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\884A.tmp"C:\Users\Admin\AppData\Local\Temp\884A.tmp"115⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\88A8.tmp"C:\Users\Admin\AppData\Local\Temp\88A8.tmp"116⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\8906.tmp"C:\Users\Admin\AppData\Local\Temp\8906.tmp"117⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\8964.tmp"C:\Users\Admin\AppData\Local\Temp\8964.tmp"118⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\89B2.tmp"C:\Users\Admin\AppData\Local\Temp\89B2.tmp"119⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\8A10.tmp"C:\Users\Admin\AppData\Local\Temp\8A10.tmp"120⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"C:\Users\Admin\AppData\Local\Temp\8A5E.tmp"121⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"122⤵PID:2400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-