Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 18:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe
-
Size
487KB
-
MD5
c88d94991973797322d6c2f7c89e6eff
-
SHA1
1f7e7205e559ed52f8d8c090547155ca35db156b
-
SHA256
64d5304bc57cd8955827944203c3826859bb4741bc5c0a78b51082e300b27146
-
SHA512
64d87d8d02b89b1c9469864a115ea350fdfd55c5e47599b7b9dfae0383b24a59d053064dae8c03e62d4c10c26a95ff49c65defb978763c8532ce351b32d01947
-
SSDEEP
6144:qorf3lPvovsgZnqG2C7mOTeiL9DUKfzQ+fxiPp8lMMPOTrRAHi1kujpu+V6QsH3j:HU5rCOTeiJT3Uh8lMU2Roi17l85NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2208 89D1.tmp 2084 7688.tmp 1600 7714.tmp 640 7782.tmp 1108 A1BE.tmp 2796 787C.tmp 1864 B8C1.tmp 4892 7985.tmp 3944 A3F1.tmp 752 7A7F.tmp 3120 7AED.tmp 836 BB03.tmp 4152 BBDE.tmp 4696 BC4B.tmp 460 D2B1.tmp 1196 D31F.tmp 824 7DFA.tmp 4012 7E77.tmp 552 7EE4.tmp 2844 7F80.tmp 4264 D570.tmp 444 D810.tmp 4896 9673.tmp 672 96F0.tmp 1156 976D.tmp 2212 97EA.tmp 2436 82BD.tmp 4188 AF4B.tmp 4820 DD12.tmp 828 84B1.tmp 1372 854D.tmp 3556 B1FA.tmp 3900 DF92.tmp 2804 E04E.tmp 1656 8760.tmp 4856 87CD.tmp 1612 885A.tmp 4888 88D7.tmp 1716 8954.tmp 2208 89D1.tmp 2040 8A3E.tmp 1952 8AAC.tmp 5044 8B29.tmp 372 CBCC.tmp 4388 8C23.tmp 2440 8CA0.tmp 3740 8D0D.tmp 4380 8D8A.tmp 4688 8DE8.tmp 1644 8E75.tmp 4928 8F20.tmp 5092 8F9D.tmp 668 901A.tmp 4004 9088.tmp 3312 90F5.tmp 4348 9163.tmp 64 A7AA.tmp 4852 A817.tmp 2260 BDF1.tmp 3968 D409.tmp 700 D476.tmp 1172 D4F3.tmp 404 949F.tmp 4680 952B.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2208 1044 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 125 PID 1044 wrote to memory of 2208 1044 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 125 PID 1044 wrote to memory of 2208 1044 2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe 125 PID 2208 wrote to memory of 2084 2208 89D1.tmp 89 PID 2208 wrote to memory of 2084 2208 89D1.tmp 89 PID 2208 wrote to memory of 2084 2208 89D1.tmp 89 PID 2084 wrote to memory of 1600 2084 7688.tmp 90 PID 2084 wrote to memory of 1600 2084 7688.tmp 90 PID 2084 wrote to memory of 1600 2084 7688.tmp 90 PID 1600 wrote to memory of 640 1600 7714.tmp 91 PID 1600 wrote to memory of 640 1600 7714.tmp 91 PID 1600 wrote to memory of 640 1600 7714.tmp 91 PID 640 wrote to memory of 1108 640 7782.tmp 186 PID 640 wrote to memory of 1108 640 7782.tmp 186 PID 640 wrote to memory of 1108 640 7782.tmp 186 PID 1108 wrote to memory of 2796 1108 A1BE.tmp 93 PID 1108 wrote to memory of 2796 1108 A1BE.tmp 93 PID 1108 wrote to memory of 2796 1108 A1BE.tmp 93 PID 2796 wrote to memory of 1864 2796 787C.tmp 238 PID 2796 wrote to memory of 1864 2796 787C.tmp 238 PID 2796 wrote to memory of 1864 2796 787C.tmp 238 PID 1864 wrote to memory of 4892 1864 B8C1.tmp 95 PID 1864 wrote to memory of 4892 1864 B8C1.tmp 95 PID 1864 wrote to memory of 4892 1864 B8C1.tmp 95 PID 4892 wrote to memory of 3944 4892 7985.tmp 191 PID 4892 wrote to memory of 3944 4892 7985.tmp 191 PID 4892 wrote to memory of 3944 4892 7985.tmp 191 PID 3944 wrote to memory of 752 3944 A3F1.tmp 100 PID 3944 wrote to memory of 752 3944 A3F1.tmp 100 PID 3944 wrote to memory of 752 3944 A3F1.tmp 100 PID 752 wrote to memory of 3120 752 7A7F.tmp 97 PID 752 wrote to memory of 3120 752 7A7F.tmp 97 PID 752 wrote to memory of 3120 752 7A7F.tmp 97 PID 3120 wrote to memory of 836 3120 7AED.tmp 243 PID 3120 wrote to memory of 836 3120 7AED.tmp 243 PID 3120 wrote to memory of 836 3120 7AED.tmp 243 PID 836 wrote to memory of 4152 836 BB03.tmp 245 PID 836 wrote to memory of 4152 836 BB03.tmp 245 PID 836 wrote to memory of 4152 836 BB03.tmp 245 PID 4152 wrote to memory of 4696 4152 BBDE.tmp 246 PID 4152 wrote to memory of 4696 4152 BBDE.tmp 246 PID 4152 wrote to memory of 4696 4152 BBDE.tmp 246 PID 4696 wrote to memory of 460 4696 BC4B.tmp 300 PID 4696 wrote to memory of 460 4696 BC4B.tmp 300 PID 4696 wrote to memory of 460 4696 BC4B.tmp 300 PID 460 wrote to memory of 1196 460 D2B1.tmp 301 PID 460 wrote to memory of 1196 460 D2B1.tmp 301 PID 460 wrote to memory of 1196 460 D2B1.tmp 301 PID 1196 wrote to memory of 824 1196 D31F.tmp 101 PID 1196 wrote to memory of 824 1196 D31F.tmp 101 PID 1196 wrote to memory of 824 1196 D31F.tmp 101 PID 824 wrote to memory of 4012 824 7DFA.tmp 104 PID 824 wrote to memory of 4012 824 7DFA.tmp 104 PID 824 wrote to memory of 4012 824 7DFA.tmp 104 PID 4012 wrote to memory of 552 4012 7E77.tmp 103 PID 4012 wrote to memory of 552 4012 7E77.tmp 103 PID 4012 wrote to memory of 552 4012 7E77.tmp 103 PID 552 wrote to memory of 2844 552 7EE4.tmp 134 PID 552 wrote to memory of 2844 552 7EE4.tmp 134 PID 552 wrote to memory of 2844 552 7EE4.tmp 134 PID 2844 wrote to memory of 4264 2844 7F80.tmp 306 PID 2844 wrote to memory of 4264 2844 7F80.tmp 306 PID 2844 wrote to memory of 4264 2844 7F80.tmp 306 PID 4264 wrote to memory of 444 4264 D570.tmp 312
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_c88d94991973797322d6c2f7c89e6eff_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"2⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\7688.tmp"C:\Users\Admin\AppData\Local\Temp\7688.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\7782.tmp"C:\Users\Admin\AppData\Local\Temp\7782.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\77FF.tmp"C:\Users\Admin\AppData\Local\Temp\77FF.tmp"6⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\7908.tmp"C:\Users\Admin\AppData\Local\Temp\7908.tmp"8⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\7A02.tmp"C:\Users\Admin\AppData\Local\Temp\7A02.tmp"10⤵PID:3944
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7B89.tmp"C:\Users\Admin\AppData\Local\Temp\7B89.tmp"1⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"C:\Users\Admin\AppData\Local\Temp\7BF6.tmp"2⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\7C73.tmp"C:\Users\Admin\AppData\Local\Temp\7C73.tmp"3⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"4⤵PID:460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7AED.tmp"C:\Users\Admin\AppData\Local\Temp\7AED.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120
-
C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"C:\Users\Admin\AppData\Local\Temp\7A7F.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752
-
C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"C:\Users\Admin\AppData\Local\Temp\7DFA.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\7E77.tmp"C:\Users\Admin\AppData\Local\Temp\7E77.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"C:\Users\Admin\AppData\Local\Temp\7D7D.tmp"1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\7F80.tmp"C:\Users\Admin\AppData\Local\Temp\7F80.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\80D8.tmp"C:\Users\Admin\AppData\Local\Temp\80D8.tmp"1⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\8174.tmp"C:\Users\Admin\AppData\Local\Temp\8174.tmp"2⤵PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"1⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"2⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\84B1.tmp"C:\Users\Admin\AppData\Local\Temp\84B1.tmp"3⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\854D.tmp"C:\Users\Admin\AppData\Local\Temp\854D.tmp"4⤵
- Executes dropped EXE
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\85CA.tmp"C:\Users\Admin\AppData\Local\Temp\85CA.tmp"1⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\8656.tmp"C:\Users\Admin\AppData\Local\Temp\8656.tmp"2⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\86E3.tmp"C:\Users\Admin\AppData\Local\Temp\86E3.tmp"3⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\8760.tmp"C:\Users\Admin\AppData\Local\Temp\8760.tmp"4⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\87CD.tmp"C:\Users\Admin\AppData\Local\Temp\87CD.tmp"5⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\885A.tmp"C:\Users\Admin\AppData\Local\Temp\885A.tmp"6⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\88D7.tmp"C:\Users\Admin\AppData\Local\Temp\88D7.tmp"7⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"8⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"C:\Users\Admin\AppData\Local\Temp\8A3E.tmp"10⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"C:\Users\Admin\AppData\Local\Temp\8AAC.tmp"11⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\8B29.tmp"C:\Users\Admin\AppData\Local\Temp\8B29.tmp"12⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\8BB5.tmp"C:\Users\Admin\AppData\Local\Temp\8BB5.tmp"13⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\8C23.tmp"C:\Users\Admin\AppData\Local\Temp\8C23.tmp"14⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\8CA0.tmp"C:\Users\Admin\AppData\Local\Temp\8CA0.tmp"15⤵
- Executes dropped EXE
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"C:\Users\Admin\AppData\Local\Temp\8D0D.tmp"16⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"C:\Users\Admin\AppData\Local\Temp\8D8A.tmp"17⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"18⤵
- Executes dropped EXE
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\8E75.tmp"C:\Users\Admin\AppData\Local\Temp\8E75.tmp"19⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\8F20.tmp"C:\Users\Admin\AppData\Local\Temp\8F20.tmp"20⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"C:\Users\Admin\AppData\Local\Temp\8F9D.tmp"21⤵
- Executes dropped EXE
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\901A.tmp"C:\Users\Admin\AppData\Local\Temp\901A.tmp"22⤵
- Executes dropped EXE
PID:668 -
C:\Users\Admin\AppData\Local\Temp\9088.tmp"C:\Users\Admin\AppData\Local\Temp\9088.tmp"23⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\90F5.tmp"C:\Users\Admin\AppData\Local\Temp\90F5.tmp"24⤵
- Executes dropped EXE
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\9163.tmp"C:\Users\Admin\AppData\Local\Temp\9163.tmp"25⤵
- Executes dropped EXE
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"26⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\924D.tmp"C:\Users\Admin\AppData\Local\Temp\924D.tmp"27⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"28⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\9337.tmp"C:\Users\Admin\AppData\Local\Temp\9337.tmp"29⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\93A5.tmp"C:\Users\Admin\AppData\Local\Temp\93A5.tmp"30⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\9422.tmp"C:\Users\Admin\AppData\Local\Temp\9422.tmp"31⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\949F.tmp"C:\Users\Admin\AppData\Local\Temp\949F.tmp"32⤵
- Executes dropped EXE
PID:404 -
C:\Users\Admin\AppData\Local\Temp\952B.tmp"C:\Users\Admin\AppData\Local\Temp\952B.tmp"33⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\9599.tmp"C:\Users\Admin\AppData\Local\Temp\9599.tmp"34⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\9606.tmp"C:\Users\Admin\AppData\Local\Temp\9606.tmp"35⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\9673.tmp"C:\Users\Admin\AppData\Local\Temp\9673.tmp"36⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\96F0.tmp"C:\Users\Admin\AppData\Local\Temp\96F0.tmp"37⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\976D.tmp"C:\Users\Admin\AppData\Local\Temp\976D.tmp"38⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"39⤵
- Executes dropped EXE
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"40⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\98C5.tmp"C:\Users\Admin\AppData\Local\Temp\98C5.tmp"41⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"42⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\99CF.tmp"C:\Users\Admin\AppData\Local\Temp\99CF.tmp"43⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"C:\Users\Admin\AppData\Local\Temp\9A2D.tmp"44⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"C:\Users\Admin\AppData\Local\Temp\9A9A.tmp"45⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\9B17.tmp"C:\Users\Admin\AppData\Local\Temp\9B17.tmp"46⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"47⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"C:\Users\Admin\AppData\Local\Temp\9BF2.tmp"48⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"C:\Users\Admin\AppData\Local\Temp\9C5F.tmp"49⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"C:\Users\Admin\AppData\Local\Temp\9CCC.tmp"50⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"C:\Users\Admin\AppData\Local\Temp\9D2A.tmp"51⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\9D98.tmp"C:\Users\Admin\AppData\Local\Temp\9D98.tmp"52⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\9E05.tmp"C:\Users\Admin\AppData\Local\Temp\9E05.tmp"53⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\9E72.tmp"C:\Users\Admin\AppData\Local\Temp\9E72.tmp"54⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"C:\Users\Admin\AppData\Local\Temp\9EFF.tmp"55⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"C:\Users\Admin\AppData\Local\Temp\9F7C.tmp"56⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"C:\Users\Admin\AppData\Local\Temp\9FE9.tmp"57⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\A076.tmp"C:\Users\Admin\AppData\Local\Temp\A076.tmp"58⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"C:\Users\Admin\AppData\Local\Temp\A0E3.tmp"59⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\A151.tmp"C:\Users\Admin\AppData\Local\Temp\A151.tmp"60⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\A1BE.tmp"C:\Users\Admin\AppData\Local\Temp\A1BE.tmp"61⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\A22B.tmp"C:\Users\Admin\AppData\Local\Temp\A22B.tmp"62⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\A299.tmp"C:\Users\Admin\AppData\Local\Temp\A299.tmp"63⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\A316.tmp"C:\Users\Admin\AppData\Local\Temp\A316.tmp"64⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\A383.tmp"C:\Users\Admin\AppData\Local\Temp\A383.tmp"65⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\A3F1.tmp"C:\Users\Admin\AppData\Local\Temp\A3F1.tmp"66⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\A45E.tmp"C:\Users\Admin\AppData\Local\Temp\A45E.tmp"67⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"C:\Users\Admin\AppData\Local\Temp\A4DB.tmp"68⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\A558.tmp"C:\Users\Admin\AppData\Local\Temp\A558.tmp"69⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"C:\Users\Admin\AppData\Local\Temp\A5C5.tmp"70⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\A642.tmp"C:\Users\Admin\AppData\Local\Temp\A642.tmp"71⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"C:\Users\Admin\AppData\Local\Temp\A6BF.tmp"72⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\A72D.tmp"C:\Users\Admin\AppData\Local\Temp\A72D.tmp"73⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"C:\Users\Admin\AppData\Local\Temp\A7AA.tmp"74⤵
- Executes dropped EXE
PID:64 -
C:\Users\Admin\AppData\Local\Temp\A817.tmp"C:\Users\Admin\AppData\Local\Temp\A817.tmp"75⤵
- Executes dropped EXE
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\A894.tmp"C:\Users\Admin\AppData\Local\Temp\A894.tmp"76⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"C:\Users\Admin\AppData\Local\Temp\A8F2.tmp"77⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\A96F.tmp"C:\Users\Admin\AppData\Local\Temp\A96F.tmp"78⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"C:\Users\Admin\AppData\Local\Temp\A9CD.tmp"79⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"80⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"C:\Users\Admin\AppData\Local\Temp\AAA7.tmp"81⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\AB24.tmp"C:\Users\Admin\AppData\Local\Temp\AB24.tmp"82⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\AB82.tmp"C:\Users\Admin\AppData\Local\Temp\AB82.tmp"83⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"C:\Users\Admin\AppData\Local\Temp\ABE0.tmp"84⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"C:\Users\Admin\AppData\Local\Temp\AC4D.tmp"85⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"C:\Users\Admin\AppData\Local\Temp\ACBB.tmp"86⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\AD28.tmp"C:\Users\Admin\AppData\Local\Temp\AD28.tmp"87⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"C:\Users\Admin\AppData\Local\Temp\ADA5.tmp"88⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\AE12.tmp"C:\Users\Admin\AppData\Local\Temp\AE12.tmp"89⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\AE70.tmp"C:\Users\Admin\AppData\Local\Temp\AE70.tmp"90⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"C:\Users\Admin\AppData\Local\Temp\AEDD.tmp"91⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"C:\Users\Admin\AppData\Local\Temp\AF4B.tmp"92⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"C:\Users\Admin\AppData\Local\Temp\AFC8.tmp"93⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\B035.tmp"C:\Users\Admin\AppData\Local\Temp\B035.tmp"94⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"C:\Users\Admin\AppData\Local\Temp\B0A3.tmp"95⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\B120.tmp"C:\Users\Admin\AppData\Local\Temp\B120.tmp"96⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\B17D.tmp"C:\Users\Admin\AppData\Local\Temp\B17D.tmp"97⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"C:\Users\Admin\AppData\Local\Temp\B1FA.tmp"98⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\B277.tmp"C:\Users\Admin\AppData\Local\Temp\B277.tmp"99⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"100⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"101⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"C:\Users\Admin\AppData\Local\Temp\B3BF.tmp"102⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\B44C.tmp"C:\Users\Admin\AppData\Local\Temp\B44C.tmp"103⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"C:\Users\Admin\AppData\Local\Temp\B4C9.tmp"104⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\B536.tmp"C:\Users\Admin\AppData\Local\Temp\B536.tmp"105⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\B594.tmp"C:\Users\Admin\AppData\Local\Temp\B594.tmp"106⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\B602.tmp"C:\Users\Admin\AppData\Local\Temp\B602.tmp"107⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\B66F.tmp"C:\Users\Admin\AppData\Local\Temp\B66F.tmp"108⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"C:\Users\Admin\AppData\Local\Temp\B6EC.tmp"109⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\B769.tmp"C:\Users\Admin\AppData\Local\Temp\B769.tmp"110⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"C:\Users\Admin\AppData\Local\Temp\B7D6.tmp"111⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"112⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"C:\Users\Admin\AppData\Local\Temp\B8C1.tmp"113⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\B92E.tmp"C:\Users\Admin\AppData\Local\Temp\B92E.tmp"114⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"C:\Users\Admin\AppData\Local\Temp\B9AB.tmp"115⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\BA28.tmp"C:\Users\Admin\AppData\Local\Temp\BA28.tmp"116⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"C:\Users\Admin\AppData\Local\Temp\BAA5.tmp"117⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\BB03.tmp"C:\Users\Admin\AppData\Local\Temp\BB03.tmp"118⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\BB70.tmp"C:\Users\Admin\AppData\Local\Temp\BB70.tmp"119⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"C:\Users\Admin\AppData\Local\Temp\BBDE.tmp"120⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"C:\Users\Admin\AppData\Local\Temp\BC4B.tmp"121⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"C:\Users\Admin\AppData\Local\Temp\BCA9.tmp"122⤵PID:2500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-