Analysis
-
max time kernel
182s -
max time network
183s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-08-2024 00:04
General
-
Target
BootstrapperV1.16.exe
-
Size
381KB
-
MD5
12d943d0d655d4d54b91d175c3e46e02
-
SHA1
9b115a4874f3da04e29315e09e50a2d61b826de8
-
SHA256
9d6024dfb9f60054eb1316eb33bf8cbc5c802d9e477a9603db5e1ed585e556f8
-
SHA512
1746222789c3f480f9364f3dd654f41be5ed3d520a58f5cd69e0cd08a8d59b81a796c6ac3e6603db493f3d5a48bc748280e19cfd48f4925f7fc38b16b9e38640
-
SSDEEP
6144:mSncRleSncRlFSncRl0snwou0bUrCsnwou0bUr:r4p4O4Dnwou5vnwou5
Malware Config
Extracted
toxiceye
https://api.telegram.org/bot7302074945:AAGKx5TnjPyRM_fqN4XQLd4uz-PUp4nl8w4/sendMessage?chat_id=6414125020
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
STUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXErat.exeSTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXErat.exeSTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXEpid process 2432 STUB DO NOT RUN THISS.EXE 2560 STUB DO NOT RUN THISS.EXE 2668 STUB DO NOT RUN THISS.EXE 920 STUB DO NOT RUN THISS.EXE 3104 STUB DO NOT RUN THISS.EXE 2344 STUB DO NOT RUN THISS.EXE 4744 STUB DO NOT RUN THISS.EXE 2420 STUB DO NOT RUN THISS.EXE 3100 STUB DO NOT RUN THISS.EXE 4540 STUB DO NOT RUN THISS.EXE 1956 STUB DO NOT RUN THISS.EXE 2424 STUB DO NOT RUN THISS.EXE 784 STUB DO NOT RUN THISS.EXE 4444 STUB DO NOT RUN THISS.EXE 2624 STUB DO NOT RUN THISS.EXE 3176 STUB DO NOT RUN THISS.EXE 3984 STUB DO NOT RUN THISS.EXE 1568 STUB DO NOT RUN THISS.EXE 4108 STUB DO NOT RUN THISS.EXE 3448 STUB DO NOT RUN THISS.EXE 3596 STUB DO NOT RUN THISS.EXE 4860 STUB DO NOT RUN THISS.EXE 4872 STUB DO NOT RUN THISS.EXE 3544 STUB DO NOT RUN THISS.EXE 2768 STUB DO NOT RUN THISS.EXE 4836 STUB DO NOT RUN THISS.EXE 2240 STUB DO NOT RUN THISS.EXE 2388 STUB DO NOT RUN THISS.EXE 3340 STUB DO NOT RUN THISS.EXE 4888 STUB DO NOT RUN THISS.EXE 4048 STUB DO NOT RUN THISS.EXE 4372 STUB DO NOT RUN THISS.EXE 4108 STUB DO NOT RUN THISS.EXE 2288 STUB DO NOT RUN THISS.EXE 1660 rat.exe 1152 STUB DO NOT RUN THISS.EXE 3604 STUB DO NOT RUN THISS.EXE 240 STUB DO NOT RUN THISS.EXE 1020 STUB DO NOT RUN THISS.EXE 2164 STUB DO NOT RUN THISS.EXE 1316 STUB DO NOT RUN THISS.EXE 3744 STUB DO NOT RUN THISS.EXE 3480 STUB DO NOT RUN THISS.EXE 3944 STUB DO NOT RUN THISS.EXE 4648 STUB DO NOT RUN THISS.EXE 1808 STUB DO NOT RUN THISS.EXE 4392 STUB DO NOT RUN THISS.EXE 2788 STUB DO NOT RUN THISS.EXE 648 STUB DO NOT RUN THISS.EXE 4656 STUB DO NOT RUN THISS.EXE 3576 STUB DO NOT RUN THISS.EXE 772 STUB DO NOT RUN THISS.EXE 1956 STUB DO NOT RUN THISS.EXE 2224 STUB DO NOT RUN THISS.EXE 3460 STUB DO NOT RUN THISS.EXE 440 STUB DO NOT RUN THISS.EXE 488 STUB DO NOT RUN THISS.EXE 1608 STUB DO NOT RUN THISS.EXE 4920 rat.exe 1944 STUB DO NOT RUN THISS.EXE 2252 STUB DO NOT RUN THISS.EXE 420 STUB DO NOT RUN THISS.EXE 2876 STUB DO NOT RUN THISS.EXE 3844 STUB DO NOT RUN THISS.EXE -
Enumerates processes with tasklist 1 TTPs 64 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 4700 4236 4952 2100 2928 2332 tasklist.exe 3672 tasklist.exe 5072 2980 1324 tasklist.exe 2060 1528 1808 412 488 2876 1076 tasklist.exe 3956 2564 2336 2368 4604 1924 560 4160 4996 2152 tasklist.exe 4632 tasklist.exe 3168 tasklist.exe 2108 tasklist.exe 4672 tasklist.exe 4384 2100 4360 3696 4964 2388 tasklist.exe 4596 1208 2564 3480 2448 3820 3044 3824 tasklist.exe 1152 4172 4392 1600 4252 3100 3192 tasklist.exe 4900 4768 2076 tasklist.exe 3496 tasklist.exe 1384 tasklist.exe 1208 2512 660 tasklist.exe 3576 tasklist.exe 1340 4236 2368 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
BOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBootstrapperV1.16.exeBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BootstrapperV1.16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOTSTRAPPERV1.16.EXE -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1268 timeout.exe 1164 4676 4316 2176 4348 2912 4168 timeout.exe 4168 4040 2588 4908 1568 timeout.exe 2640 860 2592 3576 4636 3492 timeout.exe 4440 4632 3184 2864 1976 3324 3308 timeout.exe 2624 1784 4932 4052 timeout.exe 1600 timeout.exe 784 timeout.exe 1164 3620 timeout.exe 1600 timeout.exe 4656 2300 2556 3516 4372 timeout.exe 244 836 4892 2244 5108 timeout.exe 4468 4672 3060 2624 2472 timeout.exe 3176 2904 2876 2488 4820 4944 timeout.exe 2160 timeout.exe 3060 2252 1460 4768 248 timeout.exe 3180 4564 -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 780 schtasks.exe 1456 4196 2148 3480 3484 schtasks.exe 892 4876 4956 1616 1000 schtasks.exe 1568 schtasks.exe 3508 488 2300 2060 3556 2252 916 4596 4180 1492 1480 4984 2160 3556 4196 2384 schtasks.exe 3156 schtasks.exe 1020 schtasks.exe 4596 1076 436 1440 4868 schtasks.exe 2640 schtasks.exe 3548 schtasks.exe 576 944 4980 1332 2448 schtasks.exe 3024 1876 3652 2244 4380 4224 2284 780 4824 4048 schtasks.exe 3480 schtasks.exe 2188 schtasks.exe 5108 schtasks.exe 792 schtasks.exe 3448 2560 schtasks.exe 4672 420 4576 schtasks.exe 3904 schtasks.exe 2100 2572 -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
STUB DO NOT RUN THISS.EXESTUB DO NOT RUN THISS.EXEtasklist.exeSTUB DO NOT RUN THISS.EXEtasklist.exeSTUB DO NOT RUN THISS.EXEtasklist.exedescription pid process Token: SeDebugPrivilege 2432 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 3340 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 2108 tasklist.exe Token: SeDebugPrivilege 648 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 4672 tasklist.exe Token: SeDebugPrivilege 4028 STUB DO NOT RUN THISS.EXE Token: SeDebugPrivilege 3824 tasklist.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BootstrapperV1.16.exeBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEBOOTSTRAPPERV1.16.EXEdescription pid process target process PID 4920 wrote to memory of 4620 4920 BootstrapperV1.16.exe BOOTSTRAPPERV1.16.EXE PID 4920 wrote to memory of 4620 4920 BootstrapperV1.16.exe BOOTSTRAPPERV1.16.EXE PID 4920 wrote to memory of 4620 4920 BootstrapperV1.16.exe BOOTSTRAPPERV1.16.EXE PID 4920 wrote to memory of 2432 4920 BootstrapperV1.16.exe STUB DO NOT RUN THISS.EXE PID 4920 wrote to memory of 2432 4920 BootstrapperV1.16.exe STUB DO NOT RUN THISS.EXE PID 4620 wrote to memory of 2564 4620 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 4620 wrote to memory of 2564 4620 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 4620 wrote to memory of 2564 4620 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 4620 wrote to memory of 2560 4620 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 4620 wrote to memory of 2560 4620 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 2564 wrote to memory of 2196 2564 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2564 wrote to memory of 2196 2564 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2564 wrote to memory of 2196 2564 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2564 wrote to memory of 2668 2564 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2564 wrote to memory of 2668 2564 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2196 wrote to memory of 1000 2196 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2196 wrote to memory of 1000 2196 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2196 wrote to memory of 1000 2196 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2196 wrote to memory of 920 2196 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 2196 wrote to memory of 920 2196 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 1000 wrote to memory of 3556 1000 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 1000 wrote to memory of 3556 1000 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 1000 wrote to memory of 3556 1000 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 1000 wrote to memory of 3104 1000 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1000 wrote to memory of 3104 1000 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 3556 wrote to memory of 1464 3556 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 3556 wrote to memory of 1464 3556 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 3556 wrote to memory of 1464 3556 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 3556 wrote to memory of 2344 3556 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 3556 wrote to memory of 2344 3556 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1464 wrote to memory of 2912 1464 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1464 wrote to memory of 2912 1464 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1464 wrote to memory of 2912 1464 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1464 wrote to memory of 4744 1464 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1464 wrote to memory of 4744 1464 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 2912 wrote to memory of 3436 2912 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2912 wrote to memory of 3436 2912 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2912 wrote to memory of 3436 2912 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 2912 wrote to memory of 2420 2912 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 2912 wrote to memory of 2420 2912 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 3436 wrote to memory of 780 3436 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 3436 wrote to memory of 780 3436 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 3436 wrote to memory of 780 3436 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 3436 wrote to memory of 3100 3436 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 3436 wrote to memory of 3100 3436 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 780 wrote to memory of 236 780 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 780 wrote to memory of 236 780 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 780 wrote to memory of 236 780 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 780 wrote to memory of 4540 780 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 780 wrote to memory of 4540 780 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 236 wrote to memory of 1456 236 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 236 wrote to memory of 1456 236 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 236 wrote to memory of 1456 236 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 236 wrote to memory of 1956 236 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 236 wrote to memory of 1956 236 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1456 wrote to memory of 2008 1456 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 1456 wrote to memory of 2008 1456 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 1456 wrote to memory of 2008 1456 BOOTSTRAPPERV1.16.EXE BOOTSTRAPPERV1.16.EXE PID 1456 wrote to memory of 2424 1456 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 1456 wrote to memory of 2424 1456 BOOTSTRAPPERV1.16.EXE STUB DO NOT RUN THISS.EXE PID 2008 wrote to memory of 3260 2008 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 2008 wrote to memory of 3260 2008 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 2008 wrote to memory of 3260 2008 BOOTSTRAPPERV1.16.EXE Conhost.exe PID 2008 wrote to memory of 784 2008 BOOTSTRAPPERV1.16.EXE Conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.16.exe"C:\Users\Admin\AppData\Local\Temp\BootstrapperV1.16.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"3⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"6⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"8⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"10⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"11⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"13⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"14⤵
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"15⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"16⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"17⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"18⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"19⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"20⤵
- System Location Discovery: System Language Discovery
PID:8 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"21⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"22⤵
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"23⤵
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"24⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"25⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"26⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"27⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"28⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"29⤵
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"30⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"31⤵
- System Location Discovery: System Language Discovery
PID:860 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"32⤵
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"33⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"34⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"35⤵
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"36⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"37⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"38⤵
- System Location Discovery: System Language Discovery
PID:780 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"39⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"40⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"41⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"42⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"43⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"44⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"45⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"46⤵
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"47⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"48⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"49⤵
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"50⤵
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"51⤵
- System Location Discovery: System Language Discovery
PID:424 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"52⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"53⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"54⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"55⤵
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"56⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"57⤵
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"58⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"59⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"60⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"61⤵
- System Location Discovery: System Language Discovery
PID:660 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"62⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"63⤵
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"64⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"65⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"66⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"67⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"68⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"69⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"70⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"72⤵
- System Location Discovery: System Language Discovery
PID:488 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:436 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"74⤵
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"75⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"76⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"78⤵
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"80⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"82⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"84⤵
- System Location Discovery: System Language Discovery
PID:248 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"86⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"87⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"88⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"89⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"90⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"91⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"92⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"93⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"94⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"95⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"96⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"97⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"98⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"99⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"100⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"101⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"102⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"103⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"104⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"105⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"106⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"107⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"108⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"109⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"110⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"111⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"112⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"113⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"114⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"115⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"116⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"117⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"118⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"119⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"120⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"121⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERV1.16.EXE"122⤵PID:4344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-