Analysis
-
max time kernel
17s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 02:10
Static task
static1
Behavioral task
behavioral1
Sample
e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe
Resource
win7-20240708-en
General
-
Target
e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe
-
Size
534KB
-
MD5
e2fdb6d289db0d8c4a63ed3fd819f9b0
-
SHA1
e505b8b547d9ea3a5310a58deb9246759b209f2b
-
SHA256
87cffd53d64ae9caf17af8f4e3dc7af6d5e93a717420f51f6f2c378f708c35fb
-
SHA512
5ba498a908b98e1c2c4a6b4f1d4b38e20464d66a7afc7b35f59968a462661349b9a6ce40473052771e30d99b6d8695bbc1e1aeae896e6c66701d0690be9e4ea5
-
SSDEEP
6144:dB3ULOJQSfbzDRU5DJqj2uUZARbHwFynJjtK3d7t:P3ULO2oiSBwFynJ5KN7t
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\7-Zip\7zG.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 1796 4836 WerFault.exe 121 5500 4836 WerFault.exe 121 6020 1892 WerFault.exe 122 2228 1892 WerFault.exe 122 6500 428 WerFault.exe 123 6892 428 WerFault.exe 123 1892 3216 WerFault.exe 136 7460 3216 WerFault.exe 136 7772 6572 WerFault.exe 273 4496 6600 WerFault.exe 275 7704 6588 WerFault.exe 274 8452 6644 WerFault.exe 277 9072 7040 WerFault.exe 307 6668 6572 WerFault.exe 273 7440 6588 WerFault.exe 274 1032 6644 WerFault.exe 277 10512 228 WerFault.exe 83 11352 3492 WerFault.exe 85 10804 3092 WerFault.exe 84 11812 4300 WerFault.exe 86 11864 4560 WerFault.exe 111 11032 3492 WerFault.exe 85 11496 3092 WerFault.exe 84 11712 228 WerFault.exe 83 10964 7748 WerFault.exe 349 10704 7876 WerFault.exe 352 11592 7828 WerFault.exe 350 11596 7724 WerFault.exe 348 12284 4996 WerFault.exe 381 10716 8164 WerFault.exe 375 12228 7876 WerFault.exe 352 2348 7748 WerFault.exe 349 2636 6876 WerFault.exe 501 11712 6876 WerFault.exe 501 5668 5516 WerFault.exe 212 11308 10368 WerFault.exe 640 7736 10400 WerFault.exe 641 12144 10480 WerFault.exe 642 624 10940 WerFault.exe 645 11468 10400 WerFault.exe 641 12436 11332 WerFault.exe 655 12896 10772 WerFault.exe 665 12860 12220 WerFault.exe 660 13108 11332 WerFault.exe 655 13224 12220 WerFault.exe 660 13296 10772 WerFault.exe 665 7744 4856 WerFault.exe 157 12812 4356 WerFault.exe 158 12756 5068 WerFault.exe 166 13128 5384 WerFault.exe 204 8184 12232 Process not Found 910 7608 2236 Process not Found 923 664 7992 Process not Found 893 8420 8168 Process not Found 928 10832 8968 Process not Found 475 11136 8312 Process not Found 498 5472 6960 Process not Found 499 1064 10696 Process not Found 743 13344 10980 Process not Found 739 5628 2604 Process not Found 771 5572 11172 Process not Found 766 4052 11844 Process not Found 770 6968 11900 Process not Found 772 10964 2604 Process not Found 771 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 228 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 228 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3492 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3492 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4300 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4300 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2556 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2556 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1012 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1012 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4780 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4780 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2400 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2400 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3596 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3596 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 5000 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 5000 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3952 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3952 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2552 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2552 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1208 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1208 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1188 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1188 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1684 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1684 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1448 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1448 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1776 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1776 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3948 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3948 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3828 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 3828 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4712 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4712 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 5020 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 5020 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1268 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1268 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2656 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2656 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2052 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2052 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2028 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2028 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1652 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1652 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4724 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4724 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4560 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4560 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2412 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 2412 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1564 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 1564 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4612 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 4612 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 3092 228 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 84 PID 228 wrote to memory of 3092 228 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 84 PID 228 wrote to memory of 3092 228 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 84 PID 3092 wrote to memory of 3492 3092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 85 PID 3092 wrote to memory of 3492 3092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 85 PID 3092 wrote to memory of 3492 3092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 85 PID 3492 wrote to memory of 4300 3492 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 86 PID 3492 wrote to memory of 4300 3492 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 86 PID 3492 wrote to memory of 4300 3492 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 86 PID 4300 wrote to memory of 4092 4300 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 87 PID 4300 wrote to memory of 4092 4300 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 87 PID 4300 wrote to memory of 4092 4300 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 87 PID 4092 wrote to memory of 2556 4092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 88 PID 4092 wrote to memory of 2556 4092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 88 PID 4092 wrote to memory of 2556 4092 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 88 PID 2556 wrote to memory of 1012 2556 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 89 PID 2556 wrote to memory of 1012 2556 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 89 PID 2556 wrote to memory of 1012 2556 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 89 PID 1012 wrote to memory of 4780 1012 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 90 PID 1012 wrote to memory of 4780 1012 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 90 PID 1012 wrote to memory of 4780 1012 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 90 PID 4780 wrote to memory of 2400 4780 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 91 PID 4780 wrote to memory of 2400 4780 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 91 PID 4780 wrote to memory of 2400 4780 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 91 PID 2400 wrote to memory of 3596 2400 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 92 PID 2400 wrote to memory of 3596 2400 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 92 PID 2400 wrote to memory of 3596 2400 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 92 PID 3596 wrote to memory of 5000 3596 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 93 PID 3596 wrote to memory of 5000 3596 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 93 PID 3596 wrote to memory of 5000 3596 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 93 PID 5000 wrote to memory of 3952 5000 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 94 PID 5000 wrote to memory of 3952 5000 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 94 PID 5000 wrote to memory of 3952 5000 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 94 PID 3952 wrote to memory of 2552 3952 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 95 PID 3952 wrote to memory of 2552 3952 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 95 PID 3952 wrote to memory of 2552 3952 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 95 PID 2552 wrote to memory of 1208 2552 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 96 PID 2552 wrote to memory of 1208 2552 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 96 PID 2552 wrote to memory of 1208 2552 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 96 PID 1208 wrote to memory of 1188 1208 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 97 PID 1208 wrote to memory of 1188 1208 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 97 PID 1208 wrote to memory of 1188 1208 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 97 PID 1188 wrote to memory of 1684 1188 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 98 PID 1188 wrote to memory of 1684 1188 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 98 PID 1188 wrote to memory of 1684 1188 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 98 PID 1684 wrote to memory of 1448 1684 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 99 PID 1684 wrote to memory of 1448 1684 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 99 PID 1684 wrote to memory of 1448 1684 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 99 PID 1448 wrote to memory of 1776 1448 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 100 PID 1448 wrote to memory of 1776 1448 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 100 PID 1448 wrote to memory of 1776 1448 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 100 PID 1776 wrote to memory of 3948 1776 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 101 PID 1776 wrote to memory of 3948 1776 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 101 PID 1776 wrote to memory of 3948 1776 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 101 PID 3948 wrote to memory of 3828 3948 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 102 PID 3948 wrote to memory of 3828 3948 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 102 PID 3948 wrote to memory of 3828 3948 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 102 PID 3828 wrote to memory of 4712 3828 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 103 PID 3828 wrote to memory of 4712 3828 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 103 PID 3828 wrote to memory of 4712 3828 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 103 PID 4712 wrote to memory of 5020 4712 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 104 PID 4712 wrote to memory of 5020 4712 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 104 PID 4712 wrote to memory of 5020 4712 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 104 PID 5020 wrote to memory of 1268 5020 e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"4⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"5⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"6⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"8⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"9⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"10⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"12⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"14⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"18⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"19⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"20⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"21⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"23⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"24⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"26⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"28⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"29⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"30⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"32⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"33⤵
- Drops file in Program Files directory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"34⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"35⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"36⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"37⤵
- Drops file in Program Files directory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"38⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"39⤵
- Drops file in Program Files directory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"40⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"41⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"42⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"43⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"44⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"45⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"46⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"47⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"48⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"49⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"50⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"51⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"52⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"53⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"54⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"55⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"56⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"57⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"58⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"59⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"60⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"61⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"62⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"63⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"64⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"65⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"66⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"67⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"68⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"69⤵
- System Location Discovery: System Language Discovery
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"70⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"71⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"72⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"73⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"74⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"75⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"76⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"77⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"78⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"79⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"80⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"81⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"82⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"83⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"84⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"85⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"86⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"87⤵
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"88⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"89⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"90⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"91⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"92⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"93⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"94⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"95⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"96⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"97⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"98⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"99⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"100⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"101⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"102⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"103⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"104⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"105⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"106⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"107⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"108⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"109⤵
- System Location Discovery: System Language Discovery
PID:5252 -
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"110⤵PID:5272
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"111⤵PID:5288
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"112⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"113⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"114⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"115⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"116⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"117⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"118⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"119⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"120⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"121⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"C:\Users\Admin\AppData\Local\Temp\e2fdb6d289db0d8c4a63ed3fd819f9b0N.exe"122⤵
- System Location Discovery: System Language Discovery
PID:5488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-