Analysis
-
max time kernel
182s -
max time network
183s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-08-2024 00:04
General
-
Target
BootstrapperV1.16.exe
-
Size
381KB
-
MD5
12d943d0d655d4d54b91d175c3e46e02
-
SHA1
9b115a4874f3da04e29315e09e50a2d61b826de8
-
SHA256
9d6024dfb9f60054eb1316eb33bf8cbc5c802d9e477a9603db5e1ed585e556f8
-
SHA512
1746222789c3f480f9364f3dd654f41be5ed3d520a58f5cd69e0cd08a8d59b81a796c6ac3e6603db493f3d5a48bc748280e19cfd48f4925f7fc38b16b9e38640
-
SSDEEP
6144:mSncRleSncRlFSncRl0snwou0bUrCsnwou0bUr:r4p4O4Dnwou5vnwou5
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7302074945:AAGKx5TnjPyRM_fqN4XQLd4uz-PUp4nl8w4/sendMessage?chat_id=6414125020
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2432 STUB DO NOT RUN THISS.EXE 2560 STUB DO NOT RUN THISS.EXE 2668 STUB DO NOT RUN THISS.EXE 920 STUB DO NOT RUN THISS.EXE 3104 STUB DO NOT RUN THISS.EXE 2344 STUB DO NOT RUN THISS.EXE 4744 STUB DO NOT RUN THISS.EXE 2420 STUB DO NOT RUN THISS.EXE 3100 STUB DO NOT RUN THISS.EXE 4540 STUB DO NOT RUN THISS.EXE 1956 STUB DO NOT RUN THISS.EXE 2424 STUB DO NOT RUN THISS.EXE 784 STUB DO NOT RUN THISS.EXE 4444 STUB DO NOT RUN THISS.EXE 2624 STUB DO NOT RUN THISS.EXE 3176 STUB DO NOT RUN THISS.EXE 3984 STUB DO NOT RUN THISS.EXE 1568 STUB DO NOT RUN THISS.EXE 4108 STUB DO NOT RUN THISS.EXE 3448 STUB DO NOT RUN THISS.EXE 3596 STUB DO NOT RUN THISS.EXE 4860 STUB DO NOT RUN THISS.EXE 4872 STUB DO NOT RUN THISS.EXE 3544 STUB DO NOT RUN THISS.EXE 2768 STUB DO NOT RUN THISS.EXE 4836 STUB DO NOT RUN THISS.EXE 2240 STUB DO NOT RUN THISS.EXE 2388 STUB DO NOT RUN THISS.EXE 3340 STUB DO NOT RUN THISS.EXE 4888 STUB DO NOT RUN THISS.EXE 4048 STUB DO NOT RUN THISS.EXE 4372 STUB DO NOT RUN THISS.EXE 4108 STUB DO NOT RUN THISS.EXE 2288 STUB DO NOT RUN THISS.EXE 1660 rat.exe 1152 STUB DO NOT RUN THISS.EXE 3604 STUB DO NOT RUN THISS.EXE 240 STUB DO NOT RUN THISS.EXE 1020 STUB DO NOT RUN THISS.EXE 2164 STUB DO NOT RUN THISS.EXE 1316 STUB DO NOT RUN THISS.EXE 3744 STUB DO NOT RUN THISS.EXE 3480 STUB DO NOT RUN THISS.EXE 3944 STUB DO NOT RUN THISS.EXE 4648 STUB DO NOT RUN THISS.EXE 1808 STUB DO NOT RUN THISS.EXE 4392 STUB DO NOT RUN THISS.EXE 2788 STUB DO NOT RUN THISS.EXE 648 STUB DO NOT RUN THISS.EXE 4656 STUB DO NOT RUN THISS.EXE 3576 STUB DO NOT RUN THISS.EXE 772 STUB DO NOT RUN THISS.EXE 1956 STUB DO NOT RUN THISS.EXE 2224 STUB DO NOT RUN THISS.EXE 3460 STUB DO NOT RUN THISS.EXE 440 STUB DO NOT RUN THISS.EXE 488 STUB DO NOT RUN THISS.EXE 1608 STUB DO NOT RUN THISS.EXE 4920 rat.exe 1944 STUB DO NOT RUN THISS.EXE 2252 STUB DO NOT RUN THISS.EXE 420 STUB DO NOT RUN THISS.EXE 2876 STUB DO NOT RUN THISS.EXE 3844 STUB DO NOT RUN THISS.EXE -
Enumerates processes with tasklist 1 TTPs 64 IoCs
pid Process 4700 Process not Found 4236 Process not Found 4952 Process not Found 2100 Process not Found 2928 Process not Found 2332 tasklist.exe 3672 tasklist.exe 5072 Process not Found 2980 Process not Found 1324 tasklist.exe 2060 Process not Found 1528 Process not Found 1808 Process not Found 412 Process not Found 488 Process not Found 2876 Process not Found 1076 tasklist.exe 3956 Process not Found 2564 Process not Found 2336 Process not Found 2368 Process not Found 4604 Process not Found 1924 Process not Found 560 Process not Found 4160 Process not Found 4996 Process not Found 2152 tasklist.exe 4632 tasklist.exe 3168 tasklist.exe 2108 tasklist.exe 4672 tasklist.exe 4384 Process not Found 2100 Process not Found 4360 Process not Found 3696 Process not Found 4964 Process not Found 2388 tasklist.exe 4596 Process not Found 1208 Process not Found 2564 Process not Found 3480 Process not Found 2448 Process not Found 3820 Process not Found 3044 Process not Found 3824 tasklist.exe 1152 Process not Found 4172 Process not Found 4392 Process not Found 1600 Process not Found 4252 Process not Found 3100 Process not Found 3192 tasklist.exe 4900 Process not Found 4768 Process not Found 2076 tasklist.exe 3496 tasklist.exe 1384 tasklist.exe 1208 Process not Found 2512 Process not Found 660 tasklist.exe 3576 tasklist.exe 1340 Process not Found 4236 Process not Found 2368 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperV1.16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE -
Delays execution with timeout.exe 64 IoCs
pid Process 1268 timeout.exe 1164 Process not Found 4676 Process not Found 4316 Process not Found 2176 Process not Found 4348 Process not Found 2912 Process not Found 4168 timeout.exe 4168 Process not Found 4040 Process not Found 2588 Process not Found 4908 Process not Found 1568 timeout.exe 2640 Process not Found 860 Process not Found 2592 Process not Found 3576 Process not Found 4636 Process not Found 3492 timeout.exe 4440 Process not Found 4632 Process not Found 3184 Process not Found 2864 Process not Found 1976 Process not Found 3324 Process not Found 3308 timeout.exe 2624 Process not Found 1784 Process not Found 4932 Process not Found 4052 timeout.exe 1600 timeout.exe 784 timeout.exe 1164 Process not Found 3620 timeout.exe 1600 timeout.exe 4656 Process not Found 2300 Process not Found 2556 Process not Found 3516 Process not Found 4372 timeout.exe 244 Process not Found 836 Process not Found 4892 Process not Found 2244 Process not Found 5108 timeout.exe 4468 Process not Found 4672 Process not Found 3060 Process not Found 2624 Process not Found 2472 timeout.exe 3176 Process not Found 2904 Process not Found 2876 Process not Found 2488 Process not Found 4820 Process not Found 4944 timeout.exe 2160 timeout.exe 3060 Process not Found 2252 Process not Found 1460 Process not Found 4768 Process not Found 248 timeout.exe 3180 Process not Found 4564 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 780 schtasks.exe 1456 Process not Found 4196 Process not Found 2148 Process not Found 3480 Process not Found 3484 schtasks.exe 892 Process not Found 4876 Process not Found 4956 Process not Found 1616 Process not Found 1000 schtasks.exe 1568 schtasks.exe 3508 Process not Found 488 Process not Found 2300 Process not Found 2060 Process not Found 3556 Process not Found 2252 Process not Found 916 Process not Found 4596 Process not Found 4180 Process not Found 1492 Process not Found 1480 Process not Found 4984 Process not Found 2160 Process not Found 3556 Process not Found 4196 Process not Found 2384 schtasks.exe 3156 schtasks.exe 1020 schtasks.exe 4596 Process not Found 1076 Process not Found 436 Process not Found 1440 Process not Found 4868 schtasks.exe 2640 schtasks.exe 3548 schtasks.exe 576 Process not Found 944 Process not Found 4980 Process not Found 1332 Process not Found 2448 schtasks.exe 3024 Process not Found 1876 Process not Found 3652 Process not Found 2244 Process not Found 4380 Process not Found 4224 Process not Found 2284 Process not Found 780 Process not Found 4824 Process not Found 4048 schtasks.exe 3480 schtasks.exe 2188 schtasks.exe 5108 schtasks.exe 792 schtasks.exe 3448 Process not Found 2560 schtasks.exe 4672 Process not Found 420 Process not Found 4576 schtasks.exe 3904 schtasks.exe 2100 Process not Found 2572 Process not Found -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2432 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 3340 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 2108 tasklist.exe Token: SeDebugPrivilege 648 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 4672 tasklist.exe Token: SeDebugPrivilege 4028 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 3824 tasklist.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4620 4920 BootstrapperV1.16.exe 81 PID 4920 wrote to memory of 4620 4920 BootstrapperV1.16.exe 81 PID 4920 wrote to memory of 4620 4920 BootstrapperV1.16.exe 81 PID 4920 wrote to memory of 2432 4920 BootstrapperV1.16.exe 82 PID 4920 wrote to memory of 2432 4920 BootstrapperV1.16.exe 82 PID 4620 wrote to memory of 2564 4620 BOOTSTRAPPERV1.16.EXE 84 PID 4620 wrote to memory of 2564 4620 BOOTSTRAPPERV1.16.EXE 84 PID 4620 wrote to memory of 2564 4620 BOOTSTRAPPERV1.16.EXE 84 PID 4620 wrote to memory of 2560 4620 BOOTSTRAPPERV1.16.EXE 85 PID 4620 wrote to memory of 2560 4620 BOOTSTRAPPERV1.16.EXE 85 PID 2564 wrote to memory of 2196 2564 BOOTSTRAPPERV1.16.EXE 87 PID 2564 wrote to memory of 2196 2564 BOOTSTRAPPERV1.16.EXE 87 PID 2564 wrote to memory of 2196 2564 BOOTSTRAPPERV1.16.EXE 87 PID 2564 wrote to memory of 2668 2564 BOOTSTRAPPERV1.16.EXE 138 PID 2564 wrote to memory of 2668 2564 BOOTSTRAPPERV1.16.EXE 138 PID 2196 wrote to memory of 1000 2196 BOOTSTRAPPERV1.16.EXE 90 PID 2196 wrote to memory of 1000 2196 BOOTSTRAPPERV1.16.EXE 90 PID 2196 wrote to memory of 1000 2196 BOOTSTRAPPERV1.16.EXE 90 PID 2196 wrote to memory of 920 2196 BOOTSTRAPPERV1.16.EXE 231 PID 2196 wrote to memory of 920 2196 BOOTSTRAPPERV1.16.EXE 231 PID 1000 wrote to memory of 3556 1000 BOOTSTRAPPERV1.16.EXE 93 PID 1000 wrote to memory of 3556 1000 BOOTSTRAPPERV1.16.EXE 93 PID 1000 wrote to memory of 3556 1000 BOOTSTRAPPERV1.16.EXE 93 PID 1000 wrote to memory of 3104 1000 BOOTSTRAPPERV1.16.EXE 94 PID 1000 wrote to memory of 3104 1000 BOOTSTRAPPERV1.16.EXE 94 PID 3556 wrote to memory of 1464 3556 BOOTSTRAPPERV1.16.EXE 96 PID 3556 wrote to memory of 1464 3556 BOOTSTRAPPERV1.16.EXE 96 PID 3556 wrote to memory of 1464 3556 BOOTSTRAPPERV1.16.EXE 96 PID 3556 wrote to memory of 2344 3556 BOOTSTRAPPERV1.16.EXE 97 PID 3556 wrote to memory of 2344 3556 BOOTSTRAPPERV1.16.EXE 97 PID 1464 wrote to memory of 2912 1464 BOOTSTRAPPERV1.16.EXE 335 PID 1464 wrote to memory of 2912 1464 BOOTSTRAPPERV1.16.EXE 335 PID 1464 wrote to memory of 2912 1464 BOOTSTRAPPERV1.16.EXE 335 PID 1464 wrote to memory of 4744 1464 BOOTSTRAPPERV1.16.EXE 100 PID 1464 wrote to memory of 4744 1464 BOOTSTRAPPERV1.16.EXE 100 PID 2912 wrote to memory of 3436 2912 BOOTSTRAPPERV1.16.EXE 102 PID 2912 wrote to memory of 3436 2912 BOOTSTRAPPERV1.16.EXE 102 PID 2912 wrote to memory of 3436 2912 BOOTSTRAPPERV1.16.EXE 102 PID 2912 wrote to memory of 2420 2912 BOOTSTRAPPERV1.16.EXE 103 PID 2912 wrote to memory of 2420 2912 BOOTSTRAPPERV1.16.EXE 103 PID 3436 wrote to memory of 780 3436 BOOTSTRAPPERV1.16.EXE 199 PID 3436 wrote to memory of 780 3436 BOOTSTRAPPERV1.16.EXE 199 PID 3436 wrote to memory of 780 3436 BOOTSTRAPPERV1.16.EXE 199 PID 3436 wrote to memory of 3100 3436 BOOTSTRAPPERV1.16.EXE 294 PID 3436 wrote to memory of 3100 3436 BOOTSTRAPPERV1.16.EXE 294 PID 780 wrote to memory of 236 780 BOOTSTRAPPERV1.16.EXE 108 PID 780 wrote to memory of 236 780 BOOTSTRAPPERV1.16.EXE 108 PID 780 wrote to memory of 236 780 BOOTSTRAPPERV1.16.EXE 108 PID 780 wrote to memory of 4540 780 BOOTSTRAPPERV1.16.EXE 529 PID 780 wrote to memory of 4540 780 BOOTSTRAPPERV1.16.EXE 529 PID 236 wrote to memory of 1456 236 BOOTSTRAPPERV1.16.EXE 409 PID 236 wrote to memory of 1456 236 BOOTSTRAPPERV1.16.EXE 409 PID 236 wrote to memory of 1456 236 BOOTSTRAPPERV1.16.EXE 409 PID 236 wrote to memory of 1956 236 BOOTSTRAPPERV1.16.EXE 348 PID 236 wrote to memory of 1956 236 BOOTSTRAPPERV1.16.EXE 348 PID 1456 wrote to memory of 2008 1456 BOOTSTRAPPERV1.16.EXE 114 PID 1456 wrote to memory of 2008 1456 BOOTSTRAPPERV1.16.EXE 114 PID 1456 wrote to memory of 2008 1456 BOOTSTRAPPERV1.16.EXE 114 PID 1456 wrote to memory of 2424 1456 BOOTSTRAPPERV1.16.EXE 483 PID 1456 wrote to memory of 2424 1456 BOOTSTRAPPERV1.16.EXE 483 PID 2008 wrote to memory of 3260 2008 BOOTSTRAPPERV1.16.EXE 439 PID 2008 wrote to memory of 3260 2008 BOOTSTRAPPERV1.16.EXE 439 PID 2008 wrote to memory of 3260 2008 BOOTSTRAPPERV1.16.EXE 439 PID 2008 wrote to memory of 784 2008 BOOTSTRAPPERV1.16.EXE 574 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.16.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.16.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"3⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"6⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"8⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"11⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"13⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"14⤵
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"15⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"16⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"17⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"18⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"19⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"20⤵
- System Location Discovery: System Language Discovery
PID:8 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"21⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"22⤵
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"23⤵
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"24⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"25⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"26⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"27⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"28⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"29⤵
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"30⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"31⤵
- System Location Discovery: System Language Discovery
PID:860 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"32⤵
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"33⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"34⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"35⤵
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"36⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"37⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"38⤵
- System Location Discovery: System Language Discovery
PID:780 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"39⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"40⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"41⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"42⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"43⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"44⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"45⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"46⤵
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"47⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"48⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"49⤵
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"50⤵
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"51⤵
- System Location Discovery: System Language Discovery
PID:424 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"52⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"53⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"54⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"55⤵
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"56⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"57⤵
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"58⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"59⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"60⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"61⤵
- System Location Discovery: System Language Discovery
PID:660 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"62⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"63⤵
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"64⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"65⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"66⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"67⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"68⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"69⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"70⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"72⤵
- System Location Discovery: System Language Discovery
PID:488 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:436 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"74⤵
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"75⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"76⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"78⤵
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"80⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"82⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"84⤵
- System Location Discovery: System Language Discovery
PID:248 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"86⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"87⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"88⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"89⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"90⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"91⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"92⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"93⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"94⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"95⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"96⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"97⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"98⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"99⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"100⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"101⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"102⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"103⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"104⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"105⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"106⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"107⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"108⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"109⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"110⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"111⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"112⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"113⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"114⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"115⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"116⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"117⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"118⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"119⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"120⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"121⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"122⤵PID:4344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-