Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 02:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe
-
Size
486KB
-
MD5
1e53cfdbffd2feaef2cf1ffe4338686d
-
SHA1
624d20f67c9a06b5c8cb651c05c8bcccab07a7bf
-
SHA256
13cb34d2dc819f642e7295735605f2684dbea12c7848f96b6631f24c94215454
-
SHA512
2b0b097cdffe979a006685393024d1e0ec216470ffcaec758227c31910df3565f75ff1209562f925bc08da1ffb606bfcfe9c50a6bef6f143c277df58615af374
-
SSDEEP
12288:UU5rCOTeiDdbWfIO80x9k7pWfjkSjGgbOp5MLNZ:UUQOJDZWfZ8Gk7MfjkSj7LN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2612 706D.tmp 2844 7129.tmp 1892 71C5.tmp 3068 7261.tmp 5052 9191.tmp 2532 91E0.tmp 4984 73D8.tmp 1728 7455.tmp 3484 9385.tmp 4940 9470.tmp 3128 760B.tmp 3912 7714.tmp 2512 77B0.tmp 1776 784D.tmp 3340 78CA.tmp 4388 7956.tmp 3888 79D3.tmp 1240 7A41.tmp 2672 7AFC.tmp 1280 7BA8.tmp 1088 7CB2.tmp 1420 7D3E.tmp 2600 7DDB.tmp 1704 7E67.tmp 5008 7EF4.tmp 1700 7F71.tmp 1484 7FDE.tmp 1040 807A.tmp 700 8117.tmp 3232 81E2.tmp 5016 826E.tmp 3516 82DC.tmp 452 83A7.tmp 5012 8462.tmp 1740 84EF.tmp 3260 9DE6.tmp 3428 9E43.tmp 3920 8637.tmp 3764 86E3.tmp 4136 8770.tmp 1992 87ED.tmp 3600 885A.tmp 2780 88E7.tmp 3840 8954.tmp 2624 89D1.tmp 3972 8A4E.tmp 636 8ABB.tmp 2832 8B29.tmp 4796 A49C.tmp 4936 8C52.tmp 4452 8CDE.tmp 3348 A6FE.tmp 4092 8DE8.tmp 1288 8E55.tmp 1804 8EB3.tmp 3288 A846.tmp 4692 8F6F.tmp 4512 8FDC.tmp 1272 9059.tmp 3968 90C6.tmp 5052 9191.tmp 2532 91E0.tmp 4424 925D.tmp 3944 92BA.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2612 1916 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 86 PID 1916 wrote to memory of 2612 1916 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 86 PID 1916 wrote to memory of 2612 1916 2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe 86 PID 2612 wrote to memory of 2844 2612 706D.tmp 87 PID 2612 wrote to memory of 2844 2612 706D.tmp 87 PID 2612 wrote to memory of 2844 2612 706D.tmp 87 PID 2844 wrote to memory of 1892 2844 7129.tmp 90 PID 2844 wrote to memory of 1892 2844 7129.tmp 90 PID 2844 wrote to memory of 1892 2844 7129.tmp 90 PID 1892 wrote to memory of 3068 1892 71C5.tmp 89 PID 1892 wrote to memory of 3068 1892 71C5.tmp 89 PID 1892 wrote to memory of 3068 1892 71C5.tmp 89 PID 3068 wrote to memory of 5052 3068 7261.tmp 146 PID 3068 wrote to memory of 5052 3068 7261.tmp 146 PID 3068 wrote to memory of 5052 3068 7261.tmp 146 PID 5052 wrote to memory of 2532 5052 9191.tmp 147 PID 5052 wrote to memory of 2532 5052 9191.tmp 147 PID 5052 wrote to memory of 2532 5052 9191.tmp 147 PID 2532 wrote to memory of 4984 2532 91E0.tmp 92 PID 2532 wrote to memory of 4984 2532 91E0.tmp 92 PID 2532 wrote to memory of 4984 2532 91E0.tmp 92 PID 4984 wrote to memory of 1728 4984 73D8.tmp 93 PID 4984 wrote to memory of 1728 4984 73D8.tmp 93 PID 4984 wrote to memory of 1728 4984 73D8.tmp 93 PID 1728 wrote to memory of 3484 1728 7455.tmp 151 PID 1728 wrote to memory of 3484 1728 7455.tmp 151 PID 1728 wrote to memory of 3484 1728 7455.tmp 151 PID 3484 wrote to memory of 4940 3484 9385.tmp 153 PID 3484 wrote to memory of 4940 3484 9385.tmp 153 PID 3484 wrote to memory of 4940 3484 9385.tmp 153 PID 4940 wrote to memory of 3128 4940 9470.tmp 96 PID 4940 wrote to memory of 3128 4940 9470.tmp 96 PID 4940 wrote to memory of 3128 4940 9470.tmp 96 PID 3128 wrote to memory of 3912 3128 760B.tmp 103 PID 3128 wrote to memory of 3912 3128 760B.tmp 103 PID 3128 wrote to memory of 3912 3128 760B.tmp 103 PID 3912 wrote to memory of 2512 3912 7714.tmp 97 PID 3912 wrote to memory of 2512 3912 7714.tmp 97 PID 3912 wrote to memory of 2512 3912 7714.tmp 97 PID 2512 wrote to memory of 1776 2512 77B0.tmp 98 PID 2512 wrote to memory of 1776 2512 77B0.tmp 98 PID 2512 wrote to memory of 1776 2512 77B0.tmp 98 PID 1776 wrote to memory of 3340 1776 784D.tmp 102 PID 1776 wrote to memory of 3340 1776 784D.tmp 102 PID 1776 wrote to memory of 3340 1776 784D.tmp 102 PID 3340 wrote to memory of 4388 3340 78CA.tmp 99 PID 3340 wrote to memory of 4388 3340 78CA.tmp 99 PID 3340 wrote to memory of 4388 3340 78CA.tmp 99 PID 4388 wrote to memory of 3888 4388 7956.tmp 100 PID 4388 wrote to memory of 3888 4388 7956.tmp 100 PID 4388 wrote to memory of 3888 4388 7956.tmp 100 PID 3888 wrote to memory of 1240 3888 79D3.tmp 101 PID 3888 wrote to memory of 1240 3888 79D3.tmp 101 PID 3888 wrote to memory of 1240 3888 79D3.tmp 101 PID 1240 wrote to memory of 2672 1240 7A41.tmp 104 PID 1240 wrote to memory of 2672 1240 7A41.tmp 104 PID 1240 wrote to memory of 2672 1240 7A41.tmp 104 PID 2672 wrote to memory of 1280 2672 7AFC.tmp 105 PID 2672 wrote to memory of 1280 2672 7AFC.tmp 105 PID 2672 wrote to memory of 1280 2672 7AFC.tmp 105 PID 1280 wrote to memory of 1088 1280 7BA8.tmp 106 PID 1280 wrote to memory of 1088 1280 7BA8.tmp 106 PID 1280 wrote to memory of 1088 1280 7BA8.tmp 106 PID 1088 wrote to memory of 1420 1088 7CB2.tmp 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_1e53cfdbffd2feaef2cf1ffe4338686d_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\706D.tmp"C:\Users\Admin\AppData\Local\Temp\706D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\7129.tmp"C:\Users\Admin\AppData\Local\Temp\7129.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\71C5.tmp"C:\Users\Admin\AppData\Local\Temp\71C5.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\72CE.tmp"C:\Users\Admin\AppData\Local\Temp\72CE.tmp"1⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\734B.tmp"C:\Users\Admin\AppData\Local\Temp\734B.tmp"2⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\73D8.tmp"C:\Users\Admin\AppData\Local\Temp\73D8.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\7455.tmp"C:\Users\Admin\AppData\Local\Temp\7455.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\74D2.tmp"C:\Users\Admin\AppData\Local\Temp\74D2.tmp"5⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\758E.tmp"C:\Users\Admin\AppData\Local\Temp\758E.tmp"6⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\760B.tmp"C:\Users\Admin\AppData\Local\Temp\760B.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\7714.tmp"C:\Users\Admin\AppData\Local\Temp\7714.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7261.tmp"C:\Users\Admin\AppData\Local\Temp\7261.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068
-
C:\Users\Admin\AppData\Local\Temp\77B0.tmp"C:\Users\Admin\AppData\Local\Temp\77B0.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\784D.tmp"C:\Users\Admin\AppData\Local\Temp\784D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\78CA.tmp"C:\Users\Admin\AppData\Local\Temp\78CA.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\7956.tmp"C:\Users\Admin\AppData\Local\Temp\7956.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\79D3.tmp"C:\Users\Admin\AppData\Local\Temp\79D3.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\7A41.tmp"C:\Users\Admin\AppData\Local\Temp\7A41.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"C:\Users\Admin\AppData\Local\Temp\7AFC.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"C:\Users\Admin\AppData\Local\Temp\7BA8.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"C:\Users\Admin\AppData\Local\Temp\7CB2.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"7⤵
- Executes dropped EXE
PID:1420
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"1⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\7E67.tmp"C:\Users\Admin\AppData\Local\Temp\7E67.tmp"2⤵
- Executes dropped EXE
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\807A.tmp"C:\Users\Admin\AppData\Local\Temp\807A.tmp"1⤵
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\8117.tmp"C:\Users\Admin\AppData\Local\Temp\8117.tmp"2⤵
- Executes dropped EXE
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"C:\Users\Admin\AppData\Local\Temp\7FDE.tmp"1⤵
- Executes dropped EXE
PID:1484
-
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"1⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\826E.tmp"C:\Users\Admin\AppData\Local\Temp\826E.tmp"2⤵
- Executes dropped EXE
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\82DC.tmp"C:\Users\Admin\AppData\Local\Temp\82DC.tmp"1⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\83A7.tmp"C:\Users\Admin\AppData\Local\Temp\83A7.tmp"2⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\8462.tmp"C:\Users\Admin\AppData\Local\Temp\8462.tmp"3⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\84EF.tmp"C:\Users\Admin\AppData\Local\Temp\84EF.tmp"4⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\855C.tmp"C:\Users\Admin\AppData\Local\Temp\855C.tmp"5⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\85BA.tmp"C:\Users\Admin\AppData\Local\Temp\85BA.tmp"6⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\8637.tmp"C:\Users\Admin\AppData\Local\Temp\8637.tmp"7⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\86E3.tmp"C:\Users\Admin\AppData\Local\Temp\86E3.tmp"8⤵
- Executes dropped EXE
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\8770.tmp"C:\Users\Admin\AppData\Local\Temp\8770.tmp"9⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\87ED.tmp"C:\Users\Admin\AppData\Local\Temp\87ED.tmp"10⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\885A.tmp"C:\Users\Admin\AppData\Local\Temp\885A.tmp"11⤵
- Executes dropped EXE
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\88E7.tmp"C:\Users\Admin\AppData\Local\Temp\88E7.tmp"12⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\8954.tmp"C:\Users\Admin\AppData\Local\Temp\8954.tmp"13⤵
- Executes dropped EXE
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\89D1.tmp"C:\Users\Admin\AppData\Local\Temp\89D1.tmp"14⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\8A4E.tmp"C:\Users\Admin\AppData\Local\Temp\8A4E.tmp"15⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"C:\Users\Admin\AppData\Local\Temp\8ABB.tmp"16⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\8B29.tmp"C:\Users\Admin\AppData\Local\Temp\8B29.tmp"17⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"C:\Users\Admin\AppData\Local\Temp\8BC5.tmp"18⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\8C52.tmp"C:\Users\Admin\AppData\Local\Temp\8C52.tmp"19⤵
- Executes dropped EXE
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"C:\Users\Admin\AppData\Local\Temp\8CDE.tmp"20⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"C:\Users\Admin\AppData\Local\Temp\8D6B.tmp"21⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"C:\Users\Admin\AppData\Local\Temp\8DE8.tmp"22⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\8E55.tmp"C:\Users\Admin\AppData\Local\Temp\8E55.tmp"23⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\8EB3.tmp"C:\Users\Admin\AppData\Local\Temp\8EB3.tmp"24⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\8F11.tmp"C:\Users\Admin\AppData\Local\Temp\8F11.tmp"25⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"C:\Users\Admin\AppData\Local\Temp\8F6F.tmp"26⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"C:\Users\Admin\AppData\Local\Temp\8FDC.tmp"27⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\9059.tmp"C:\Users\Admin\AppData\Local\Temp\9059.tmp"28⤵
- Executes dropped EXE
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\90C6.tmp"C:\Users\Admin\AppData\Local\Temp\90C6.tmp"29⤵
- Executes dropped EXE
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\9191.tmp"C:\Users\Admin\AppData\Local\Temp\9191.tmp"30⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\91E0.tmp"C:\Users\Admin\AppData\Local\Temp\91E0.tmp"31⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\925D.tmp"C:\Users\Admin\AppData\Local\Temp\925D.tmp"32⤵
- Executes dropped EXE
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\92BA.tmp"C:\Users\Admin\AppData\Local\Temp\92BA.tmp"33⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\9318.tmp"C:\Users\Admin\AppData\Local\Temp\9318.tmp"34⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\9385.tmp"C:\Users\Admin\AppData\Local\Temp\9385.tmp"35⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\9402.tmp"C:\Users\Admin\AppData\Local\Temp\9402.tmp"36⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\9470.tmp"C:\Users\Admin\AppData\Local\Temp\9470.tmp"37⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\94DD.tmp"C:\Users\Admin\AppData\Local\Temp\94DD.tmp"38⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\955A.tmp"C:\Users\Admin\AppData\Local\Temp\955A.tmp"39⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\95C8.tmp"C:\Users\Admin\AppData\Local\Temp\95C8.tmp"40⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\9635.tmp"C:\Users\Admin\AppData\Local\Temp\9635.tmp"41⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\96A2.tmp"C:\Users\Admin\AppData\Local\Temp\96A2.tmp"42⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\9700.tmp"C:\Users\Admin\AppData\Local\Temp\9700.tmp"43⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\976D.tmp"C:\Users\Admin\AppData\Local\Temp\976D.tmp"44⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\97EA.tmp"C:\Users\Admin\AppData\Local\Temp\97EA.tmp"45⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\9867.tmp"C:\Users\Admin\AppData\Local\Temp\9867.tmp"46⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\98D5.tmp"C:\Users\Admin\AppData\Local\Temp\98D5.tmp"47⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\9942.tmp"C:\Users\Admin\AppData\Local\Temp\9942.tmp"48⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\99B0.tmp"C:\Users\Admin\AppData\Local\Temp\99B0.tmp"49⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"C:\Users\Admin\AppData\Local\Temp\9A1D.tmp"50⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"C:\Users\Admin\AppData\Local\Temp\9A8A.tmp"51⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\9AF8.tmp"C:\Users\Admin\AppData\Local\Temp\9AF8.tmp"52⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\9B55.tmp"C:\Users\Admin\AppData\Local\Temp\9B55.tmp"53⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"C:\Users\Admin\AppData\Local\Temp\9BD2.tmp"54⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\9C40.tmp"C:\Users\Admin\AppData\Local\Temp\9C40.tmp"55⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\9CBD.tmp"C:\Users\Admin\AppData\Local\Temp\9CBD.tmp"56⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"C:\Users\Admin\AppData\Local\Temp\9D1B.tmp"57⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\9D78.tmp"C:\Users\Admin\AppData\Local\Temp\9D78.tmp"58⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"C:\Users\Admin\AppData\Local\Temp\9DE6.tmp"59⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\9E43.tmp"C:\Users\Admin\AppData\Local\Temp\9E43.tmp"60⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"C:\Users\Admin\AppData\Local\Temp\9EE0.tmp"61⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"C:\Users\Admin\AppData\Local\Temp\9F4D.tmp"62⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\9FBA.tmp"C:\Users\Admin\AppData\Local\Temp\9FBA.tmp"63⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\A028.tmp"C:\Users\Admin\AppData\Local\Temp\A028.tmp"64⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\A095.tmp"C:\Users\Admin\AppData\Local\Temp\A095.tmp"65⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\A122.tmp"C:\Users\Admin\AppData\Local\Temp\A122.tmp"66⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\A18F.tmp"C:\Users\Admin\AppData\Local\Temp\A18F.tmp"67⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\A20C.tmp"C:\Users\Admin\AppData\Local\Temp\A20C.tmp"68⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\A26A.tmp"C:\Users\Admin\AppData\Local\Temp\A26A.tmp"69⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"C:\Users\Admin\AppData\Local\Temp\A2D7.tmp"70⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\A354.tmp"C:\Users\Admin\AppData\Local\Temp\A354.tmp"71⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"C:\Users\Admin\AppData\Local\Temp\A3D1.tmp"72⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\A42F.tmp"C:\Users\Admin\AppData\Local\Temp\A42F.tmp"73⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\A49C.tmp"C:\Users\Admin\AppData\Local\Temp\A49C.tmp"74⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\A50A.tmp"C:\Users\Admin\AppData\Local\Temp\A50A.tmp"75⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\A577.tmp"C:\Users\Admin\AppData\Local\Temp\A577.tmp"76⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"C:\Users\Admin\AppData\Local\Temp\A5F4.tmp"77⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\A681.tmp"C:\Users\Admin\AppData\Local\Temp\A681.tmp"78⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"C:\Users\Admin\AppData\Local\Temp\A6FE.tmp"79⤵
- Executes dropped EXE
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\A76B.tmp"C:\Users\Admin\AppData\Local\Temp\A76B.tmp"80⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"C:\Users\Admin\AppData\Local\Temp\A7D9.tmp"81⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\A846.tmp"C:\Users\Admin\AppData\Local\Temp\A846.tmp"82⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"C:\Users\Admin\AppData\Local\Temp\A8C3.tmp"83⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\A930.tmp"C:\Users\Admin\AppData\Local\Temp\A930.tmp"84⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"C:\Users\Admin\AppData\Local\Temp\A9AD.tmp"85⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"C:\Users\Admin\AppData\Local\Temp\AA3A.tmp"86⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\AAC7.tmp"C:\Users\Admin\AppData\Local\Temp\AAC7.tmp"87⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\AB34.tmp"C:\Users\Admin\AppData\Local\Temp\AB34.tmp"88⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"C:\Users\Admin\AppData\Local\Temp\ABA1.tmp"89⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"C:\Users\Admin\AppData\Local\Temp\AC0F.tmp"90⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"C:\Users\Admin\AppData\Local\Temp\AC9B.tmp"91⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\AD09.tmp"C:\Users\Admin\AppData\Local\Temp\AD09.tmp"92⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"C:\Users\Admin\AppData\Local\Temp\ADE3.tmp"93⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\AE70.tmp"C:\Users\Admin\AppData\Local\Temp\AE70.tmp"94⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"C:\Users\Admin\AppData\Local\Temp\AF3B.tmp"95⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"C:\Users\Admin\AppData\Local\Temp\AFA9.tmp"96⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\B083.tmp"C:\Users\Admin\AppData\Local\Temp\B083.tmp"97⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\B12F.tmp"C:\Users\Admin\AppData\Local\Temp\B12F.tmp"98⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\B21A.tmp"C:\Users\Admin\AppData\Local\Temp\B21A.tmp"99⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"C:\Users\Admin\AppData\Local\Temp\B2E5.tmp"100⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"101⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"C:\Users\Admin\AppData\Local\Temp\B3DF.tmp"102⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\B43C.tmp"C:\Users\Admin\AppData\Local\Temp\B43C.tmp"103⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\B49A.tmp"C:\Users\Admin\AppData\Local\Temp\B49A.tmp"104⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"C:\Users\Admin\AppData\Local\Temp\B4F8.tmp"105⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\B585.tmp"C:\Users\Admin\AppData\Local\Temp\B585.tmp"106⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\B611.tmp"C:\Users\Admin\AppData\Local\Temp\B611.tmp"107⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\B69E.tmp"C:\Users\Admin\AppData\Local\Temp\B69E.tmp"108⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\B853.tmp"C:\Users\Admin\AppData\Local\Temp\B853.tmp"109⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\B94D.tmp"C:\Users\Admin\AppData\Local\Temp\B94D.tmp"110⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"C:\Users\Admin\AppData\Local\Temp\B9F9.tmp"111⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\BA67.tmp"C:\Users\Admin\AppData\Local\Temp\BA67.tmp"112⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\BB61.tmp"C:\Users\Admin\AppData\Local\Temp\BB61.tmp"113⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"C:\Users\Admin\AppData\Local\Temp\BC2C.tmp"114⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\BD06.tmp"C:\Users\Admin\AppData\Local\Temp\BD06.tmp"115⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"C:\Users\Admin\AppData\Local\Temp\BDD2.tmp"116⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"C:\Users\Admin\AppData\Local\Temp\BE6E.tmp"117⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"C:\Users\Admin\AppData\Local\Temp\BEDB.tmp"118⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\BF39.tmp"C:\Users\Admin\AppData\Local\Temp\BF39.tmp"119⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"C:\Users\Admin\AppData\Local\Temp\BFA6.tmp"120⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\C014.tmp"C:\Users\Admin\AppData\Local\Temp\C014.tmp"121⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\C081.tmp"C:\Users\Admin\AppData\Local\Temp\C081.tmp"122⤵PID:4500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-