Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 16:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
General
-
Target
2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe
-
Size
486KB
-
MD5
58baa98d68599a2ae9af162c7539ec99
-
SHA1
eccf5070f57fd7290fe6ab4ef5863a6d8f0f6a5f
-
SHA256
9d1f1cd0291019182efa332f9c0fd84beb4f7d8e6811d970ae28df0566c35ac0
-
SHA512
5d4c917f4a8719204a9c3e55491259fd755d46dbbc71e6ba82a7ff91a3285fd516c50ebdb03c491a4de9b479f4210659b58a0dd722a9aaf9770478ec9d38c2fe
-
SSDEEP
12288:/U5rCOTeiDoDCSx0+JPt9S2/1DFoj8K2NZ:/UQOJDoOSq+nR/nooN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3680 6AA1.tmp 2068 6B2D.tmp 4296 6B9B.tmp 3908 91B1.tmp 380 6CA4.tmp 1616 6D31.tmp 3792 mousocoreworker.exe 4336 6E2B.tmp 3256 95E7.tmp 2420 6F25.tmp 2892 82BD.tmp 4264 702F.tmp 5076 70AC.tmp 3880 7119.tmp 4544 71D4.tmp 4676 7251.tmp 3348 72BF.tmp 1468 731D.tmp 4456 739A.tmp 4172 74C2.tmp 1460 755F.tmp 3716 75BC.tmp 5048 7639.tmp 784 76C6.tmp 1732 8DC9.tmp 968 77FF.tmp 4792 78AA.tmp 3276 7956.tmp 1432 79E3.tmp 3036 90D6.tmp 1328 9143.tmp 4976 7B6A.tmp 3196 7BF6.tmp 2732 7CA2.tmp 2560 7D1F.tmp 4936 7D9C.tmp 3156 7E09.tmp 2440 7E96.tmp 4588 7F52.tmp 4576 7FBF.tmp 4768 804C.tmp 3396 80D8.tmp 3256 95E7.tmp 2984 81D2.tmp 3932 824F.tmp 2892 82BD.tmp 1552 832A.tmp 4776 8397.tmp 2580 8414.tmp 3924 8491.tmp 1592 850E.tmp 4816 859B.tmp 4696 8618.tmp 644 8695.tmp 5000 8702.tmp 3996 8770.tmp 984 87DD.tmp 4460 884A.tmp 4088 88C7.tmp 1596 8944.tmp 4072 89D1.tmp 4488 8A2F.tmp 2520 8A9C.tmp 3588 8B0A.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3680 1244 2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe 65 PID 1244 wrote to memory of 3680 1244 2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe 65 PID 1244 wrote to memory of 3680 1244 2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe 65 PID 3680 wrote to memory of 2068 3680 6AA1.tmp 68 PID 3680 wrote to memory of 2068 3680 6AA1.tmp 68 PID 3680 wrote to memory of 2068 3680 6AA1.tmp 68 PID 2068 wrote to memory of 4296 2068 6B2D.tmp 70 PID 2068 wrote to memory of 4296 2068 6B2D.tmp 70 PID 2068 wrote to memory of 4296 2068 6B2D.tmp 70 PID 4296 wrote to memory of 3908 4296 6B9B.tmp 172 PID 4296 wrote to memory of 3908 4296 6B9B.tmp 172 PID 4296 wrote to memory of 3908 4296 6B9B.tmp 172 PID 3908 wrote to memory of 380 3908 91B1.tmp 73 PID 3908 wrote to memory of 380 3908 91B1.tmp 73 PID 3908 wrote to memory of 380 3908 91B1.tmp 73 PID 380 wrote to memory of 1616 380 6CA4.tmp 75 PID 380 wrote to memory of 1616 380 6CA4.tmp 75 PID 380 wrote to memory of 1616 380 6CA4.tmp 75 PID 1616 wrote to memory of 3792 1616 6D31.tmp 175 PID 1616 wrote to memory of 3792 1616 6D31.tmp 175 PID 1616 wrote to memory of 3792 1616 6D31.tmp 175 PID 3792 wrote to memory of 4336 3792 mousocoreworker.exe 78 PID 3792 wrote to memory of 4336 3792 mousocoreworker.exe 78 PID 3792 wrote to memory of 4336 3792 mousocoreworker.exe 78 PID 4336 wrote to memory of 3256 4336 6E2B.tmp 183 PID 4336 wrote to memory of 3256 4336 6E2B.tmp 183 PID 4336 wrote to memory of 3256 4336 6E2B.tmp 183 PID 3256 wrote to memory of 2420 3256 95E7.tmp 90 PID 3256 wrote to memory of 2420 3256 95E7.tmp 90 PID 3256 wrote to memory of 2420 3256 95E7.tmp 90 PID 2420 wrote to memory of 2892 2420 6F25.tmp 138 PID 2420 wrote to memory of 2892 2420 6F25.tmp 138 PID 2420 wrote to memory of 2892 2420 6F25.tmp 138 PID 2892 wrote to memory of 4264 2892 82BD.tmp 127 PID 2892 wrote to memory of 4264 2892 82BD.tmp 127 PID 2892 wrote to memory of 4264 2892 82BD.tmp 127 PID 4264 wrote to memory of 5076 4264 702F.tmp 94 PID 4264 wrote to memory of 5076 4264 702F.tmp 94 PID 4264 wrote to memory of 5076 4264 702F.tmp 94 PID 5076 wrote to memory of 3880 5076 70AC.tmp 95 PID 5076 wrote to memory of 3880 5076 70AC.tmp 95 PID 5076 wrote to memory of 3880 5076 70AC.tmp 95 PID 3880 wrote to memory of 4544 3880 7119.tmp 124 PID 3880 wrote to memory of 4544 3880 7119.tmp 124 PID 3880 wrote to memory of 4544 3880 7119.tmp 124 PID 4544 wrote to memory of 4676 4544 71D4.tmp 99 PID 4544 wrote to memory of 4676 4544 71D4.tmp 99 PID 4544 wrote to memory of 4676 4544 71D4.tmp 99 PID 4676 wrote to memory of 3348 4676 7251.tmp 96 PID 4676 wrote to memory of 3348 4676 7251.tmp 96 PID 4676 wrote to memory of 3348 4676 7251.tmp 96 PID 3348 wrote to memory of 1468 3348 72BF.tmp 98 PID 3348 wrote to memory of 1468 3348 72BF.tmp 98 PID 3348 wrote to memory of 1468 3348 72BF.tmp 98 PID 1468 wrote to memory of 4456 1468 731D.tmp 97 PID 1468 wrote to memory of 4456 1468 731D.tmp 97 PID 1468 wrote to memory of 4456 1468 731D.tmp 97 PID 4456 wrote to memory of 4172 4456 739A.tmp 122 PID 4456 wrote to memory of 4172 4456 739A.tmp 122 PID 4456 wrote to memory of 4172 4456 739A.tmp 122 PID 4172 wrote to memory of 1460 4172 74C2.tmp 119 PID 4172 wrote to memory of 1460 4172 74C2.tmp 119 PID 4172 wrote to memory of 1460 4172 74C2.tmp 119 PID 1460 wrote to memory of 3716 1460 755F.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_58baa98d68599a2ae9af162c7539ec99_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"C:\Users\Admin\AppData\Local\Temp\6AA1.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"C:\Users\Admin\AppData\Local\Temp\6B2D.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"C:\Users\Admin\AppData\Local\Temp\6B9B.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\6C27.tmp"C:\Users\Admin\AppData\Local\Temp\6C27.tmp"5⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"C:\Users\Admin\AppData\Local\Temp\6CA4.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\6D31.tmp"C:\Users\Admin\AppData\Local\Temp\6D31.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"C:\Users\Admin\AppData\Local\Temp\6D8F.tmp"8⤵PID:3792
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6E2B.tmp"C:\Users\Admin\AppData\Local\Temp\6E2B.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"C:\Users\Admin\AppData\Local\Temp\6EA8.tmp"2⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\6F25.tmp"C:\Users\Admin\AppData\Local\Temp\6F25.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\6FC1.tmp"C:\Users\Admin\AppData\Local\Temp\6FC1.tmp"4⤵PID:2892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\70AC.tmp"C:\Users\Admin\AppData\Local\Temp\70AC.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\7119.tmp"C:\Users\Admin\AppData\Local\Temp\7119.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\71D4.tmp"C:\Users\Admin\AppData\Local\Temp\71D4.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Temp\72BF.tmp"C:\Users\Admin\AppData\Local\Temp\72BF.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\731D.tmp"C:\Users\Admin\AppData\Local\Temp\731D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\739A.tmp"C:\Users\Admin\AppData\Local\Temp\739A.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\74C2.tmp"C:\Users\Admin\AppData\Local\Temp\74C2.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\7251.tmp"C:\Users\Admin\AppData\Local\Temp\7251.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"1⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\7743.tmp"C:\Users\Admin\AppData\Local\Temp\7743.tmp"2⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\77FF.tmp"C:\Users\Admin\AppData\Local\Temp\77FF.tmp"3⤵
- Executes dropped EXE
PID:968
-
-
-
C:\Users\Admin\AppData\Local\Temp\7639.tmp"C:\Users\Admin\AppData\Local\Temp\7639.tmp"1⤵
- Executes dropped EXE
PID:5048
-
C:\Users\Admin\AppData\Local\Temp\75BC.tmp"C:\Users\Admin\AppData\Local\Temp\75BC.tmp"1⤵
- Executes dropped EXE
PID:3716
-
C:\Users\Admin\AppData\Local\Temp\78AA.tmp"C:\Users\Admin\AppData\Local\Temp\78AA.tmp"1⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\7956.tmp"C:\Users\Admin\AppData\Local\Temp\7956.tmp"2⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\79E3.tmp"C:\Users\Admin\AppData\Local\Temp\79E3.tmp"3⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"4⤵PID:3036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"C:\Users\Admin\AppData\Local\Temp\7B6A.tmp"2⤵
- Executes dropped EXE
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"3⤵
- Executes dropped EXE
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"4⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"C:\Users\Admin\AppData\Local\Temp\7D1F.tmp"5⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"C:\Users\Admin\AppData\Local\Temp\7D9C.tmp"6⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\7E09.tmp"C:\Users\Admin\AppData\Local\Temp\7E09.tmp"7⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\7E96.tmp"C:\Users\Admin\AppData\Local\Temp\7E96.tmp"8⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\7F52.tmp"C:\Users\Admin\AppData\Local\Temp\7F52.tmp"9⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"C:\Users\Admin\AppData\Local\Temp\7FBF.tmp"10⤵
- Executes dropped EXE
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"11⤵
- Executes dropped EXE
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\80D8.tmp"C:\Users\Admin\AppData\Local\Temp\80D8.tmp"12⤵
- Executes dropped EXE
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\8155.tmp"C:\Users\Admin\AppData\Local\Temp\8155.tmp"13⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\81D2.tmp"C:\Users\Admin\AppData\Local\Temp\81D2.tmp"14⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\824F.tmp"C:\Users\Admin\AppData\Local\Temp\824F.tmp"15⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\82BD.tmp"C:\Users\Admin\AppData\Local\Temp\82BD.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\832A.tmp"C:\Users\Admin\AppData\Local\Temp\832A.tmp"17⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\8397.tmp"C:\Users\Admin\AppData\Local\Temp\8397.tmp"18⤵
- Executes dropped EXE
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\8414.tmp"C:\Users\Admin\AppData\Local\Temp\8414.tmp"19⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\8491.tmp"C:\Users\Admin\AppData\Local\Temp\8491.tmp"20⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\850E.tmp"C:\Users\Admin\AppData\Local\Temp\850E.tmp"21⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\859B.tmp"C:\Users\Admin\AppData\Local\Temp\859B.tmp"22⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\8618.tmp"C:\Users\Admin\AppData\Local\Temp\8618.tmp"23⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\8695.tmp"C:\Users\Admin\AppData\Local\Temp\8695.tmp"24⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\8702.tmp"C:\Users\Admin\AppData\Local\Temp\8702.tmp"25⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\8770.tmp"C:\Users\Admin\AppData\Local\Temp\8770.tmp"26⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\87DD.tmp"C:\Users\Admin\AppData\Local\Temp\87DD.tmp"27⤵
- Executes dropped EXE
PID:984 -
C:\Users\Admin\AppData\Local\Temp\884A.tmp"C:\Users\Admin\AppData\Local\Temp\884A.tmp"28⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\88C7.tmp"C:\Users\Admin\AppData\Local\Temp\88C7.tmp"29⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\8944.tmp"C:\Users\Admin\AppData\Local\Temp\8944.tmp"30⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"31⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"32⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\8A9C.tmp"C:\Users\Admin\AppData\Local\Temp\8A9C.tmp"33⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"C:\Users\Admin\AppData\Local\Temp\8B0A.tmp"34⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\8B87.tmp"C:\Users\Admin\AppData\Local\Temp\8B87.tmp"35⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"C:\Users\Admin\AppData\Local\Temp\8BF4.tmp"36⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\8C61.tmp"C:\Users\Admin\AppData\Local\Temp\8C61.tmp"37⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"C:\Users\Admin\AppData\Local\Temp\8CCF.tmp"38⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\8D4C.tmp"C:\Users\Admin\AppData\Local\Temp\8D4C.tmp"39⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"C:\Users\Admin\AppData\Local\Temp\8DC9.tmp"40⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\8E26.tmp"C:\Users\Admin\AppData\Local\Temp\8E26.tmp"41⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"C:\Users\Admin\AppData\Local\Temp\8EA3.tmp"42⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\8F20.tmp"C:\Users\Admin\AppData\Local\Temp\8F20.tmp"43⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\8F8E.tmp"C:\Users\Admin\AppData\Local\Temp\8F8E.tmp"44⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"C:\Users\Admin\AppData\Local\Temp\8FFB.tmp"45⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\9069.tmp"C:\Users\Admin\AppData\Local\Temp\9069.tmp"46⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\90D6.tmp"C:\Users\Admin\AppData\Local\Temp\90D6.tmp"47⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\9143.tmp"C:\Users\Admin\AppData\Local\Temp\9143.tmp"48⤵
- Executes dropped EXE
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\91B1.tmp"C:\Users\Admin\AppData\Local\Temp\91B1.tmp"49⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\922E.tmp"C:\Users\Admin\AppData\Local\Temp\922E.tmp"50⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\928B.tmp"C:\Users\Admin\AppData\Local\Temp\928B.tmp"51⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\92F9.tmp"C:\Users\Admin\AppData\Local\Temp\92F9.tmp"52⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\9357.tmp"C:\Users\Admin\AppData\Local\Temp\9357.tmp"53⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\93E3.tmp"C:\Users\Admin\AppData\Local\Temp\93E3.tmp"54⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\948F.tmp"C:\Users\Admin\AppData\Local\Temp\948F.tmp"55⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\94ED.tmp"C:\Users\Admin\AppData\Local\Temp\94ED.tmp"56⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\956A.tmp"C:\Users\Admin\AppData\Local\Temp\956A.tmp"57⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\95E7.tmp"C:\Users\Admin\AppData\Local\Temp\95E7.tmp"58⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\9673.tmp"C:\Users\Admin\AppData\Local\Temp\9673.tmp"59⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\96E1.tmp"C:\Users\Admin\AppData\Local\Temp\96E1.tmp"60⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\977D.tmp"C:\Users\Admin\AppData\Local\Temp\977D.tmp"61⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\9887.tmp"C:\Users\Admin\AppData\Local\Temp\9887.tmp"62⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\9923.tmp"C:\Users\Admin\AppData\Local\Temp\9923.tmp"63⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"64⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\9B07.tmp"C:\Users\Admin\AppData\Local\Temp\9B07.tmp"65⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"C:\Users\Admin\AppData\Local\Temp\9BE2.tmp"66⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\9C9E.tmp"C:\Users\Admin\AppData\Local\Temp\9C9E.tmp"67⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\9D78.tmp"C:\Users\Admin\AppData\Local\Temp\9D78.tmp"68⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\9E34.tmp"C:\Users\Admin\AppData\Local\Temp\9E34.tmp"69⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\9EA1.tmp"C:\Users\Admin\AppData\Local\Temp\9EA1.tmp"70⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"C:\Users\Admin\AppData\Local\Temp\9EEF.tmp"71⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"72⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"C:\Users\Admin\AppData\Local\Temp\9FCA.tmp"73⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\A037.tmp"C:\Users\Admin\AppData\Local\Temp\A037.tmp"74⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"C:\Users\Admin\AppData\Local\Temp\A0D4.tmp"75⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\A141.tmp"C:\Users\Admin\AppData\Local\Temp\A141.tmp"76⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\A1ED.tmp"C:\Users\Admin\AppData\Local\Temp\A1ED.tmp"77⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\A25A.tmp"C:\Users\Admin\AppData\Local\Temp\A25A.tmp"78⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"C:\Users\Admin\AppData\Local\Temp\A2B8.tmp"79⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\A335.tmp"C:\Users\Admin\AppData\Local\Temp\A335.tmp"80⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\A48D.tmp"C:\Users\Admin\AppData\Local\Temp\A48D.tmp"81⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\A568.tmp"C:\Users\Admin\AppData\Local\Temp\A568.tmp"82⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\A652.tmp"C:\Users\Admin\AppData\Local\Temp\A652.tmp"83⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"C:\Users\Admin\AppData\Local\Temp\A6CF.tmp"84⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\A74C.tmp"C:\Users\Admin\AppData\Local\Temp\A74C.tmp"85⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"86⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\A856.tmp"C:\Users\Admin\AppData\Local\Temp\A856.tmp"87⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"C:\Users\Admin\AppData\Local\Temp\A8D3.tmp"88⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\A940.tmp"C:\Users\Admin\AppData\Local\Temp\A940.tmp"89⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"90⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\AA69.tmp"C:\Users\Admin\AppData\Local\Temp\AA69.tmp"91⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"C:\Users\Admin\AppData\Local\Temp\AAE6.tmp"92⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\AB72.tmp"C:\Users\Admin\AppData\Local\Temp\AB72.tmp"93⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"94⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"C:\Users\Admin\AppData\Local\Temp\AC7C.tmp"95⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"C:\Users\Admin\AppData\Local\Temp\ACF9.tmp"96⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\AD76.tmp"C:\Users\Admin\AppData\Local\Temp\AD76.tmp"97⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"C:\Users\Admin\AppData\Local\Temp\ADF3.tmp"98⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\AE80.tmp"C:\Users\Admin\AppData\Local\Temp\AE80.tmp"99⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"C:\Users\Admin\AppData\Local\Temp\AEFD.tmp"100⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"C:\Users\Admin\AppData\Local\Temp\AF7A.tmp"101⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\B006.tmp"C:\Users\Admin\AppData\Local\Temp\B006.tmp"102⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\B083.tmp"C:\Users\Admin\AppData\Local\Temp\B083.tmp"103⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"104⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\B16E.tmp"C:\Users\Admin\AppData\Local\Temp\B16E.tmp"105⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"C:\Users\Admin\AppData\Local\Temp\B1EB.tmp"106⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\B258.tmp"C:\Users\Admin\AppData\Local\Temp\B258.tmp"107⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"C:\Users\Admin\AppData\Local\Temp\B2F4.tmp"108⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"109⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"C:\Users\Admin\AppData\Local\Temp\B3EE.tmp"110⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"111⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"C:\Users\Admin\AppData\Local\Temp\B4E8.tmp"112⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\B565.tmp"C:\Users\Admin\AppData\Local\Temp\B565.tmp"113⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"C:\Users\Admin\AppData\Local\Temp\B5F2.tmp"114⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"115⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"C:\Users\Admin\AppData\Local\Temp\B6FC.tmp"116⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\B779.tmp"C:\Users\Admin\AppData\Local\Temp\B779.tmp"117⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"C:\Users\Admin\AppData\Local\Temp\B7F6.tmp"118⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\B882.tmp"C:\Users\Admin\AppData\Local\Temp\B882.tmp"119⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"C:\Users\Admin\AppData\Local\Temp\B8F0.tmp"120⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\B95D.tmp"C:\Users\Admin\AppData\Local\Temp\B95D.tmp"121⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"C:\Users\Admin\AppData\Local\Temp\B9EA.tmp"122⤵PID:3996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-