Analysis
-
max time kernel
21s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
2a08da6710c5f4af9f1dfe92a9df3dd0N.exe
Resource
win7-20240903-en
General
-
Target
2a08da6710c5f4af9f1dfe92a9df3dd0N.exe
-
Size
641KB
-
MD5
2a08da6710c5f4af9f1dfe92a9df3dd0
-
SHA1
cb69f404b6376a193a5ec29b4fc54614162110ea
-
SHA256
89e61e6d81a87b3972b2038a4ac0704a74bce56040ea57a01088023dce1823d3
-
SHA512
ca93e3ccd626595585ecd02b0936c3a11108708a123aef9617ce6b90673a067c4045dbdde355719862c43c26c21d187ba0cb08ae70d278abf14bd58b0dc3eef8
-
SSDEEP
3072:5rUkWzVIMULOJQSfbzg0jcOORQh8b6/s5DymqWa2uUZARbpvqi+qvybdlDno0G:5y3ULOJQSfbzTRk5DJqj2uUZARL2L
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 3856 4312 WerFault.exe 82 1828 4312 WerFault.exe 82 1172 2068 WerFault.exe 83 4432 2068 WerFault.exe 83 5208 2428 WerFault.exe 84 5488 2428 WerFault.exe 84 5972 4252 WerFault.exe 85 5136 4252 WerFault.exe 85 5140 4964 WerFault.exe 86 6252 4964 WerFault.exe 86 6392 2012 WerFault.exe 105 6684 2012 WerFault.exe 105 6308 5696 WerFault.exe 230 6200 5712 WerFault.exe 231 6356 5728 WerFault.exe 232 8324 5964 WerFault.exe 235 7364 6120 WerFault.exe 244 9044 3276 WerFault.exe 277 8992 3208 WerFault.exe 273 9128 5728 WerFault.exe 232 7428 5712 WerFault.exe 231 10900 7664 WerFault.exe 483 10828 5912 WerFault.exe 328 11388 6216 WerFault.exe 330 11644 1152 WerFault.exe 329 11624 3144 WerFault.exe 332 10876 7176 WerFault.exe 347 11168 7540 WerFault.exe 349 11304 6216 WerFault.exe 330 11512 3144 WerFault.exe 332 11732 7540 WerFault.exe 349 12168 7664 WerFault.exe 483 11308 7624 WerFault.exe 484 12576 7624 WerFault.exe 484 12492 5740 WerFault.exe 623 13300 8100 WerFault.exe 622 12772 5712 WerFault.exe 627 12812 9320 WerFault.exe 634 12516 9540 WerFault.exe 644 12932 9588 WerFault.exe 647 13140 9444 WerFault.exe 638 7584 9320 WerFault.exe 634 9296 9540 WerFault.exe 644 13168 9588 WerFault.exe 647 9464 3480 WerFault.exe 106 14616 1432 WerFault.exe 123 14932 2912 Process not Found 147 14656 10752 Process not Found 862 13692 12592 Process not Found 874 13488 12484 Process not Found 891 14292 7412 Process not Found 479 9592 8504 Process not Found 444 14896 9116 Process not Found 473 15296 9208 Process not Found 478 15160 7412 Process not Found 479 4108 10252 Process not Found 687 2364 10264 Process not Found 688 14888 10284 Process not Found 689 8396 10300 Process not Found 690 12620 10980 Process not Found 727 224 10912 Process not Found 723 2228 10284 Process not Found 689 12696 10252 Process not Found 687 10380 12588 Process not Found 944 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4312 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4312 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2068 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2068 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2428 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2428 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4252 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4252 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4964 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4964 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 972 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 972 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2212 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2212 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3564 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3564 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2084 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2084 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 5108 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 5108 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3132 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3132 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4748 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4748 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3640 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3640 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1588 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1588 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3792 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3792 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4904 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4904 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2960 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2960 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2280 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2280 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1232 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1232 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4088 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 4088 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1076 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1076 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2360 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2360 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2012 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2012 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3480 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3480 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1408 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1408 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3420 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 3420 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2604 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 2604 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 5020 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 5020 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1404 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1404 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1240 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 1240 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4312 wrote to memory of 2068 4312 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 83 PID 4312 wrote to memory of 2068 4312 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 83 PID 4312 wrote to memory of 2068 4312 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 83 PID 2068 wrote to memory of 2428 2068 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 84 PID 2068 wrote to memory of 2428 2068 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 84 PID 2068 wrote to memory of 2428 2068 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 84 PID 2428 wrote to memory of 4252 2428 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 85 PID 2428 wrote to memory of 4252 2428 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 85 PID 2428 wrote to memory of 4252 2428 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 85 PID 4252 wrote to memory of 4964 4252 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 86 PID 4252 wrote to memory of 4964 4252 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 86 PID 4252 wrote to memory of 4964 4252 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 86 PID 4964 wrote to memory of 972 4964 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 87 PID 4964 wrote to memory of 972 4964 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 87 PID 4964 wrote to memory of 972 4964 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 87 PID 972 wrote to memory of 2212 972 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 88 PID 972 wrote to memory of 2212 972 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 88 PID 972 wrote to memory of 2212 972 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 88 PID 2212 wrote to memory of 4688 2212 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 89 PID 2212 wrote to memory of 4688 2212 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 89 PID 2212 wrote to memory of 4688 2212 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 89 PID 4688 wrote to memory of 3564 4688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 90 PID 4688 wrote to memory of 3564 4688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 90 PID 4688 wrote to memory of 3564 4688 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 90 PID 3564 wrote to memory of 2084 3564 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 91 PID 3564 wrote to memory of 2084 3564 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 91 PID 3564 wrote to memory of 2084 3564 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 91 PID 2084 wrote to memory of 5108 2084 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 92 PID 2084 wrote to memory of 5108 2084 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 92 PID 2084 wrote to memory of 5108 2084 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 92 PID 5108 wrote to memory of 3132 5108 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 93 PID 5108 wrote to memory of 3132 5108 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 93 PID 5108 wrote to memory of 3132 5108 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 93 PID 3132 wrote to memory of 4748 3132 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 94 PID 3132 wrote to memory of 4748 3132 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 94 PID 3132 wrote to memory of 4748 3132 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 94 PID 4748 wrote to memory of 3640 4748 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 95 PID 4748 wrote to memory of 3640 4748 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 95 PID 4748 wrote to memory of 3640 4748 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 95 PID 3640 wrote to memory of 1588 3640 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 96 PID 3640 wrote to memory of 1588 3640 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 96 PID 3640 wrote to memory of 1588 3640 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 96 PID 1588 wrote to memory of 3792 1588 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 97 PID 1588 wrote to memory of 3792 1588 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 97 PID 1588 wrote to memory of 3792 1588 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 97 PID 3792 wrote to memory of 4904 3792 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 98 PID 3792 wrote to memory of 4904 3792 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 98 PID 3792 wrote to memory of 4904 3792 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 98 PID 4904 wrote to memory of 2960 4904 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 99 PID 4904 wrote to memory of 2960 4904 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 99 PID 4904 wrote to memory of 2960 4904 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 99 PID 2960 wrote to memory of 2280 2960 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 100 PID 2960 wrote to memory of 2280 2960 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 100 PID 2960 wrote to memory of 2280 2960 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 100 PID 2280 wrote to memory of 1232 2280 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 101 PID 2280 wrote to memory of 1232 2280 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 101 PID 2280 wrote to memory of 1232 2280 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 101 PID 1232 wrote to memory of 4088 1232 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 102 PID 1232 wrote to memory of 4088 1232 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 102 PID 1232 wrote to memory of 4088 1232 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 102 PID 4088 wrote to memory of 1076 4088 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 103 PID 4088 wrote to memory of 1076 4088 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 103 PID 4088 wrote to memory of 1076 4088 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 103 PID 1076 wrote to memory of 2360 1076 2a08da6710c5f4af9f1dfe92a9df3dd0N.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"2⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"4⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"10⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"18⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"19⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"20⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"21⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"24⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"25⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"26⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"28⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"30⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"31⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"33⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"34⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"35⤵
- Drops file in Program Files directory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"36⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"37⤵
- Drops file in Program Files directory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"38⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"39⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"40⤵
- Drops file in Program Files directory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"41⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"42⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"43⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"44⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"45⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"46⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"47⤵
- Drops file in Program Files directory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"48⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"49⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"50⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"51⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"52⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"53⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"54⤵
- Drops file in Program Files directory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"55⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"56⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"57⤵
- Drops file in Program Files directory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"58⤵
- Drops file in Program Files directory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"59⤵
- Drops file in Program Files directory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"60⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"61⤵
- Drops file in Program Files directory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"62⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"63⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"64⤵
- Drops file in Program Files directory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"65⤵
- Drops file in Program Files directory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"66⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"67⤵
- Drops file in Program Files directory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"68⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"69⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"70⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"71⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"72⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"73⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"74⤵
- Drops file in Program Files directory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"75⤵
- Drops file in Program Files directory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"76⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"77⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"78⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"79⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"80⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"81⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"82⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"83⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"84⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"85⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"86⤵
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"87⤵
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"88⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"90⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"91⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"92⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"93⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"94⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"95⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"96⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"97⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"98⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"99⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"100⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"101⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"102⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"103⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"104⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"105⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"106⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"107⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"108⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"109⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"110⤵PID:5268
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"111⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"112⤵
- System Location Discovery: System Language Discovery
PID:5300 -
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"113⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"114⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"115⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"116⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"117⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"118⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"119⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"120⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"121⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"C:\Users\Admin\AppData\Local\Temp\2a08da6710c5f4af9f1dfe92a9df3dd0N.exe"122⤵PID:5504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-