Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
56d0c983a914902fb6a47bd70fd6a260N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56d0c983a914902fb6a47bd70fd6a260N.exe
Resource
win10v2004-20240802-en
General
-
Target
56d0c983a914902fb6a47bd70fd6a260N.exe
-
Size
1.2MB
-
MD5
56d0c983a914902fb6a47bd70fd6a260
-
SHA1
8d46fcb3c3c6461bfa83355d81cae10ac3356421
-
SHA256
e655c8c61a403dd0eed96a6b1a7efe5705393fec6e7ae498799c8c68c88a685e
-
SHA512
1e4e931022afbad49e24743870d019a4398192489aed08a31d6d655f291588d02fabfc331a39447c9d89eaf3238e49d886be0196cf6b9247281eedd07fc7a5a9
-
SSDEEP
24576:QAHnh+eWsN3skA4RV1Hom2KXcmtcajS3SKDvVXH62dxbT5:Hh+ZkldoPKsacajSC6Xd
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\benting.vbs benting.exe -
Executes dropped EXE 64 IoCs
pid Process 1856 benting.exe 3000 benting.exe 2744 benting.exe 2796 benting.exe 2808 benting.exe 2508 benting.exe 2552 benting.exe 1140 benting.exe 316 benting.exe 2344 benting.exe 1892 benting.exe 2416 benting.exe 2728 benting.exe 1392 benting.exe 336 benting.exe 1276 benting.exe 1644 benting.exe 1588 benting.exe 608 benting.exe 2424 benting.exe 352 benting.exe 1636 benting.exe 2976 benting.exe 2064 benting.exe 1856 benting.exe 2056 benting.exe 2664 benting.exe 2624 benting.exe 2672 benting.exe 2560 benting.exe 2228 benting.exe 1852 benting.exe 1352 benting.exe 2456 benting.exe 1256 benting.exe 1036 benting.exe 2824 benting.exe 2736 benting.exe 2012 benting.exe 1696 benting.exe 2352 benting.exe 1672 benting.exe 328 benting.exe 1644 benting.exe 1456 benting.exe 812 benting.exe 1980 benting.exe 2180 benting.exe 2364 benting.exe 2848 benting.exe 1264 benting.exe 3020 benting.exe 3000 benting.exe 2700 benting.exe 2696 benting.exe 2784 benting.exe 2524 benting.exe 2528 benting.exe 1336 benting.exe 1744 benting.exe 1300 benting.exe 1432 benting.exe 1736 benting.exe 2256 benting.exe -
Loads dropped DLL 1 IoCs
pid Process 1960 56d0c983a914902fb6a47bd70fd6a260N.exe -
AutoIT Executable 21 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1960-0-0x00000000002B0000-0x00000000003F5000-memory.dmp autoit_exe behavioral1/files/0x000700000001922c-13.dat autoit_exe behavioral1/memory/1856-17-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/3000-33-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2744-47-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2796-61-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2552-103-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2344-145-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/1892-159-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/1392-201-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/336-215-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/1276-229-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/608-271-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2424-285-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/352-299-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/1636-311-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2624-377-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2672-388-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/2560-399-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/1852-421-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe behavioral1/memory/1980-586-0x0000000000AE0000-0x0000000000C25000-memory.dmp autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benting.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1856 1960 56d0c983a914902fb6a47bd70fd6a260N.exe 30 PID 1960 wrote to memory of 1856 1960 56d0c983a914902fb6a47bd70fd6a260N.exe 30 PID 1960 wrote to memory of 1856 1960 56d0c983a914902fb6a47bd70fd6a260N.exe 30 PID 1960 wrote to memory of 1856 1960 56d0c983a914902fb6a47bd70fd6a260N.exe 30 PID 1856 wrote to memory of 3000 1856 benting.exe 31 PID 1856 wrote to memory of 3000 1856 benting.exe 31 PID 1856 wrote to memory of 3000 1856 benting.exe 31 PID 1856 wrote to memory of 3000 1856 benting.exe 31 PID 3000 wrote to memory of 2744 3000 benting.exe 32 PID 3000 wrote to memory of 2744 3000 benting.exe 32 PID 3000 wrote to memory of 2744 3000 benting.exe 32 PID 3000 wrote to memory of 2744 3000 benting.exe 32 PID 2744 wrote to memory of 2796 2744 benting.exe 33 PID 2744 wrote to memory of 2796 2744 benting.exe 33 PID 2744 wrote to memory of 2796 2744 benting.exe 33 PID 2744 wrote to memory of 2796 2744 benting.exe 33 PID 2796 wrote to memory of 2808 2796 benting.exe 34 PID 2796 wrote to memory of 2808 2796 benting.exe 34 PID 2796 wrote to memory of 2808 2796 benting.exe 34 PID 2796 wrote to memory of 2808 2796 benting.exe 34 PID 2808 wrote to memory of 2508 2808 benting.exe 35 PID 2808 wrote to memory of 2508 2808 benting.exe 35 PID 2808 wrote to memory of 2508 2808 benting.exe 35 PID 2808 wrote to memory of 2508 2808 benting.exe 35 PID 2508 wrote to memory of 2552 2508 benting.exe 36 PID 2508 wrote to memory of 2552 2508 benting.exe 36 PID 2508 wrote to memory of 2552 2508 benting.exe 36 PID 2508 wrote to memory of 2552 2508 benting.exe 36 PID 2552 wrote to memory of 1140 2552 benting.exe 37 PID 2552 wrote to memory of 1140 2552 benting.exe 37 PID 2552 wrote to memory of 1140 2552 benting.exe 37 PID 2552 wrote to memory of 1140 2552 benting.exe 37 PID 1140 wrote to memory of 316 1140 benting.exe 38 PID 1140 wrote to memory of 316 1140 benting.exe 38 PID 1140 wrote to memory of 316 1140 benting.exe 38 PID 1140 wrote to memory of 316 1140 benting.exe 38 PID 316 wrote to memory of 2344 316 benting.exe 40 PID 316 wrote to memory of 2344 316 benting.exe 40 PID 316 wrote to memory of 2344 316 benting.exe 40 PID 316 wrote to memory of 2344 316 benting.exe 40 PID 2344 wrote to memory of 1892 2344 benting.exe 41 PID 2344 wrote to memory of 1892 2344 benting.exe 41 PID 2344 wrote to memory of 1892 2344 benting.exe 41 PID 2344 wrote to memory of 1892 2344 benting.exe 41 PID 1892 wrote to memory of 2416 1892 benting.exe 42 PID 1892 wrote to memory of 2416 1892 benting.exe 42 PID 1892 wrote to memory of 2416 1892 benting.exe 42 PID 1892 wrote to memory of 2416 1892 benting.exe 42 PID 2416 wrote to memory of 2728 2416 benting.exe 43 PID 2416 wrote to memory of 2728 2416 benting.exe 43 PID 2416 wrote to memory of 2728 2416 benting.exe 43 PID 2416 wrote to memory of 2728 2416 benting.exe 43 PID 2728 wrote to memory of 1392 2728 benting.exe 44 PID 2728 wrote to memory of 1392 2728 benting.exe 44 PID 2728 wrote to memory of 1392 2728 benting.exe 44 PID 2728 wrote to memory of 1392 2728 benting.exe 44 PID 1392 wrote to memory of 336 1392 benting.exe 45 PID 1392 wrote to memory of 336 1392 benting.exe 45 PID 1392 wrote to memory of 336 1392 benting.exe 45 PID 1392 wrote to memory of 336 1392 benting.exe 45 PID 336 wrote to memory of 1276 336 benting.exe 46 PID 336 wrote to memory of 1276 336 benting.exe 46 PID 336 wrote to memory of 1276 336 benting.exe 46 PID 336 wrote to memory of 1276 336 benting.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\56d0c983a914902fb6a47bd70fd6a260N.exe"C:\Users\Admin\AppData\Local\Temp\56d0c983a914902fb6a47bd70fd6a260N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\Temp\56d0c983a914902fb6a47bd70fd6a260N.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"17⤵
- Executes dropped EXE
PID:1276 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"19⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"20⤵
- Executes dropped EXE
PID:608 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:352 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"23⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"27⤵
- Executes dropped EXE
PID:2056 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"28⤵
- Executes dropped EXE
PID:2664 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"29⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"31⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"32⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"34⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"35⤵
- Executes dropped EXE
PID:2456 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"36⤵
- Executes dropped EXE
PID:1256 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"37⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"38⤵
- Executes dropped EXE
PID:2824 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"39⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"40⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"41⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"42⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"43⤵
- Executes dropped EXE
PID:1672 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:328 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"46⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"49⤵
- Executes dropped EXE
PID:2180 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"50⤵
- Executes dropped EXE
PID:2364 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"51⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"52⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"54⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"56⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"60⤵
- Executes dropped EXE
PID:1336 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"64⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"66⤵PID:2812
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"67⤵PID:2724
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"68⤵PID:2716
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"69⤵PID:2044
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"70⤵PID:1716
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"71⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"72⤵
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"73⤵PID:3040
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"74⤵PID:2592
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"75⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"76⤵PID:2348
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"77⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"78⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"79⤵PID:1640
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"80⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"81⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"82⤵PID:1848
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"83⤵PID:2196
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"84⤵PID:2852
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"85⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"86⤵PID:2520
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"87⤵PID:2968
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"88⤵PID:2440
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"90⤵PID:1852
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"91⤵
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"92⤵PID:1912
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"93⤵
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"94⤵PID:1036
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"95⤵PID:2824
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"96⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"97⤵PID:2012
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"99⤵PID:2352
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"100⤵
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"101⤵PID:1972
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"102⤵PID:2096
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"103⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"104⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"105⤵PID:1440
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"106⤵PID:2904
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"107⤵PID:2376
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"108⤵PID:2848
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"110⤵PID:2864
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"111⤵PID:984
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"112⤵PID:2760
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"113⤵
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"114⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"115⤵PID:276
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"116⤵PID:1232
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"117⤵
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"118⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"119⤵PID:1732
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"120⤵PID:1032
-
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"121⤵
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"C:\Users\Admin\AppData\Local\hepatoduodenostomy\benting.exe"122⤵PID:2820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-