Analysis
-
max time kernel
18s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
354c3e97d9d6a70851512d9a5e501610N.exe
Resource
win7-20240903-en
General
-
Target
354c3e97d9d6a70851512d9a5e501610N.exe
-
Size
2.9MB
-
MD5
354c3e97d9d6a70851512d9a5e501610
-
SHA1
d7d912b318ba6d39c049306c53ac0c89843ada9d
-
SHA256
f00737e5f99822f4f25becb0681bb976d2ae201fe5a713e7bf5d45dd66d39061
-
SHA512
134cf7e17f075a592690c8339807690a0cb593b4ea55470204eba220b098b15ccaccf63ed197b7c89eff63809f857ea606fe5451122493109252f9e623fc7388
-
SSDEEP
49152:V22l2SFlFFHRiYjhpJbHS/QXZc+lS4vsgKSZFHRguABhTMspE/QDFr:ZVriY3syZcn4Pdg9vMs6QZr
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 354c3e97d9d6a70851512d9a5e501610N.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 8152 6508 WerFault.exe 263 7904 6508 WerFault.exe 263 10200 784 WerFault.exe 111 9588 2684 WerFault.exe 119 8920 3104 WerFault.exe 112 12396 5072 WerFault.exe 153 12536 1116 WerFault.exe 142 12604 4836 WerFault.exe 156 12544 3400 WerFault.exe 140 9952 1116 WerFault.exe 142 9944 2684 WerFault.exe 557 10008 3104 WerFault.exe 112 9528 2812 WerFault.exe 116 9096 1104 WerFault.exe 121 12384 6092 WerFault.exe 237 14084 6408 WerFault.exe 257 10204 5948 WerFault.exe 228 7888 6184 WerFault.exe 243 12504 3944 WerFault.exe 398 13276 8328 WerFault.exe 402 12408 9172 WerFault.exe 411 13328 6092 WerFault.exe 237 14236 3944 WerFault.exe 398 14068 9172 WerFault.exe 411 3184 8328 WerFault.exe 402 6500 7940 WerFault.exe 326 14040 7940 WerFault.exe 326 12548 11976 WerFault.exe 674 12208 9984 WerFault.exe 677 13036 11976 WerFault.exe 674 1660 12480 WerFault.exe 681 6936 12692 WerFault.exe 688 12296 12780 WerFault.exe 692 14292 12840 WerFault.exe 694 8544 12480 WerFault.exe 681 13676 12692 WerFault.exe 688 4684 12780 WerFault.exe 692 14180 6992 WerFault.exe 292 4136 7008 WerFault.exe 293 12576 7024 WerFault.exe 294 6036 7072 WerFault.exe 297 6372 13372 WerFault.exe 846 10016 13448 WerFault.exe 852 13416 1216 WerFault.exe 840 12340 13860 WerFault.exe 859 8584 1436 Process not Found 115 12348 1216 Process not Found 840 4764 4144 Process not Found 148 14276 4856 Process not Found 151 4148 9924 Process not Found 466 12828 10084 Process not Found 474 13872 9932 Process not Found 472 7384 10012 Process not Found 469 10072 9924 Process not Found 466 13072 6076 Process not Found 236 12736 10012 Process not Found 469 12912 9932 Process not Found 472 4820 2272 Process not Found 158 7464 664 Process not Found 123 10016 3204 Process not Found 150 7296 4640 Process not Found 154 13668 13296 Process not Found 708 8184 13296 Process not Found 708 212 13404 Process not Found 710 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 354c3e97d9d6a70851512d9a5e501610N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1776 354c3e97d9d6a70851512d9a5e501610N.exe 1776 354c3e97d9d6a70851512d9a5e501610N.exe 5016 354c3e97d9d6a70851512d9a5e501610N.exe 5016 354c3e97d9d6a70851512d9a5e501610N.exe 4884 354c3e97d9d6a70851512d9a5e501610N.exe 4884 354c3e97d9d6a70851512d9a5e501610N.exe 1884 354c3e97d9d6a70851512d9a5e501610N.exe 1884 354c3e97d9d6a70851512d9a5e501610N.exe 460 354c3e97d9d6a70851512d9a5e501610N.exe 460 354c3e97d9d6a70851512d9a5e501610N.exe 2840 354c3e97d9d6a70851512d9a5e501610N.exe 2840 354c3e97d9d6a70851512d9a5e501610N.exe 2724 354c3e97d9d6a70851512d9a5e501610N.exe 2724 354c3e97d9d6a70851512d9a5e501610N.exe 3648 354c3e97d9d6a70851512d9a5e501610N.exe 3648 354c3e97d9d6a70851512d9a5e501610N.exe 4112 354c3e97d9d6a70851512d9a5e501610N.exe 4112 354c3e97d9d6a70851512d9a5e501610N.exe 4252 354c3e97d9d6a70851512d9a5e501610N.exe 4252 354c3e97d9d6a70851512d9a5e501610N.exe 2204 354c3e97d9d6a70851512d9a5e501610N.exe 2204 354c3e97d9d6a70851512d9a5e501610N.exe 4500 354c3e97d9d6a70851512d9a5e501610N.exe 4500 354c3e97d9d6a70851512d9a5e501610N.exe 1012 354c3e97d9d6a70851512d9a5e501610N.exe 1012 354c3e97d9d6a70851512d9a5e501610N.exe 816 354c3e97d9d6a70851512d9a5e501610N.exe 816 354c3e97d9d6a70851512d9a5e501610N.exe 4900 354c3e97d9d6a70851512d9a5e501610N.exe 4900 354c3e97d9d6a70851512d9a5e501610N.exe 100 354c3e97d9d6a70851512d9a5e501610N.exe 100 354c3e97d9d6a70851512d9a5e501610N.exe 2880 354c3e97d9d6a70851512d9a5e501610N.exe 2880 354c3e97d9d6a70851512d9a5e501610N.exe 4216 354c3e97d9d6a70851512d9a5e501610N.exe 4216 354c3e97d9d6a70851512d9a5e501610N.exe 2904 354c3e97d9d6a70851512d9a5e501610N.exe 2904 354c3e97d9d6a70851512d9a5e501610N.exe 3344 354c3e97d9d6a70851512d9a5e501610N.exe 3344 354c3e97d9d6a70851512d9a5e501610N.exe 1648 354c3e97d9d6a70851512d9a5e501610N.exe 1648 354c3e97d9d6a70851512d9a5e501610N.exe 4632 354c3e97d9d6a70851512d9a5e501610N.exe 4632 354c3e97d9d6a70851512d9a5e501610N.exe 4832 354c3e97d9d6a70851512d9a5e501610N.exe 4832 354c3e97d9d6a70851512d9a5e501610N.exe 744 354c3e97d9d6a70851512d9a5e501610N.exe 744 354c3e97d9d6a70851512d9a5e501610N.exe 4948 354c3e97d9d6a70851512d9a5e501610N.exe 4948 354c3e97d9d6a70851512d9a5e501610N.exe 2432 354c3e97d9d6a70851512d9a5e501610N.exe 2432 354c3e97d9d6a70851512d9a5e501610N.exe 2032 354c3e97d9d6a70851512d9a5e501610N.exe 2032 354c3e97d9d6a70851512d9a5e501610N.exe 784 354c3e97d9d6a70851512d9a5e501610N.exe 784 354c3e97d9d6a70851512d9a5e501610N.exe 3104 354c3e97d9d6a70851512d9a5e501610N.exe 3104 354c3e97d9d6a70851512d9a5e501610N.exe 4568 354c3e97d9d6a70851512d9a5e501610N.exe 4568 354c3e97d9d6a70851512d9a5e501610N.exe 1436 354c3e97d9d6a70851512d9a5e501610N.exe 1436 354c3e97d9d6a70851512d9a5e501610N.exe 2812 354c3e97d9d6a70851512d9a5e501610N.exe 2812 354c3e97d9d6a70851512d9a5e501610N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 5016 1776 354c3e97d9d6a70851512d9a5e501610N.exe 83 PID 1776 wrote to memory of 5016 1776 354c3e97d9d6a70851512d9a5e501610N.exe 83 PID 1776 wrote to memory of 5016 1776 354c3e97d9d6a70851512d9a5e501610N.exe 83 PID 5016 wrote to memory of 4884 5016 354c3e97d9d6a70851512d9a5e501610N.exe 84 PID 5016 wrote to memory of 4884 5016 354c3e97d9d6a70851512d9a5e501610N.exe 84 PID 5016 wrote to memory of 4884 5016 354c3e97d9d6a70851512d9a5e501610N.exe 84 PID 4884 wrote to memory of 1884 4884 354c3e97d9d6a70851512d9a5e501610N.exe 85 PID 4884 wrote to memory of 1884 4884 354c3e97d9d6a70851512d9a5e501610N.exe 85 PID 4884 wrote to memory of 1884 4884 354c3e97d9d6a70851512d9a5e501610N.exe 85 PID 1884 wrote to memory of 460 1884 354c3e97d9d6a70851512d9a5e501610N.exe 86 PID 1884 wrote to memory of 460 1884 354c3e97d9d6a70851512d9a5e501610N.exe 86 PID 1884 wrote to memory of 460 1884 354c3e97d9d6a70851512d9a5e501610N.exe 86 PID 460 wrote to memory of 2840 460 354c3e97d9d6a70851512d9a5e501610N.exe 88 PID 460 wrote to memory of 2840 460 354c3e97d9d6a70851512d9a5e501610N.exe 88 PID 460 wrote to memory of 2840 460 354c3e97d9d6a70851512d9a5e501610N.exe 88 PID 2840 wrote to memory of 2724 2840 354c3e97d9d6a70851512d9a5e501610N.exe 89 PID 2840 wrote to memory of 2724 2840 354c3e97d9d6a70851512d9a5e501610N.exe 89 PID 2840 wrote to memory of 2724 2840 354c3e97d9d6a70851512d9a5e501610N.exe 89 PID 2724 wrote to memory of 3648 2724 354c3e97d9d6a70851512d9a5e501610N.exe 90 PID 2724 wrote to memory of 3648 2724 354c3e97d9d6a70851512d9a5e501610N.exe 90 PID 2724 wrote to memory of 3648 2724 354c3e97d9d6a70851512d9a5e501610N.exe 90 PID 3648 wrote to memory of 4112 3648 354c3e97d9d6a70851512d9a5e501610N.exe 91 PID 3648 wrote to memory of 4112 3648 354c3e97d9d6a70851512d9a5e501610N.exe 91 PID 3648 wrote to memory of 4112 3648 354c3e97d9d6a70851512d9a5e501610N.exe 91 PID 4112 wrote to memory of 4252 4112 354c3e97d9d6a70851512d9a5e501610N.exe 92 PID 4112 wrote to memory of 4252 4112 354c3e97d9d6a70851512d9a5e501610N.exe 92 PID 4112 wrote to memory of 4252 4112 354c3e97d9d6a70851512d9a5e501610N.exe 92 PID 4252 wrote to memory of 2204 4252 354c3e97d9d6a70851512d9a5e501610N.exe 93 PID 4252 wrote to memory of 2204 4252 354c3e97d9d6a70851512d9a5e501610N.exe 93 PID 4252 wrote to memory of 2204 4252 354c3e97d9d6a70851512d9a5e501610N.exe 93 PID 2204 wrote to memory of 4500 2204 354c3e97d9d6a70851512d9a5e501610N.exe 94 PID 2204 wrote to memory of 4500 2204 354c3e97d9d6a70851512d9a5e501610N.exe 94 PID 2204 wrote to memory of 4500 2204 354c3e97d9d6a70851512d9a5e501610N.exe 94 PID 4500 wrote to memory of 1012 4500 354c3e97d9d6a70851512d9a5e501610N.exe 95 PID 4500 wrote to memory of 1012 4500 354c3e97d9d6a70851512d9a5e501610N.exe 95 PID 4500 wrote to memory of 1012 4500 354c3e97d9d6a70851512d9a5e501610N.exe 95 PID 1012 wrote to memory of 816 1012 354c3e97d9d6a70851512d9a5e501610N.exe 96 PID 1012 wrote to memory of 816 1012 354c3e97d9d6a70851512d9a5e501610N.exe 96 PID 1012 wrote to memory of 816 1012 354c3e97d9d6a70851512d9a5e501610N.exe 96 PID 816 wrote to memory of 4900 816 354c3e97d9d6a70851512d9a5e501610N.exe 97 PID 816 wrote to memory of 4900 816 354c3e97d9d6a70851512d9a5e501610N.exe 97 PID 816 wrote to memory of 4900 816 354c3e97d9d6a70851512d9a5e501610N.exe 97 PID 4900 wrote to memory of 100 4900 354c3e97d9d6a70851512d9a5e501610N.exe 98 PID 4900 wrote to memory of 100 4900 354c3e97d9d6a70851512d9a5e501610N.exe 98 PID 4900 wrote to memory of 100 4900 354c3e97d9d6a70851512d9a5e501610N.exe 98 PID 100 wrote to memory of 2880 100 354c3e97d9d6a70851512d9a5e501610N.exe 99 PID 100 wrote to memory of 2880 100 354c3e97d9d6a70851512d9a5e501610N.exe 99 PID 100 wrote to memory of 2880 100 354c3e97d9d6a70851512d9a5e501610N.exe 99 PID 2880 wrote to memory of 4216 2880 354c3e97d9d6a70851512d9a5e501610N.exe 100 PID 2880 wrote to memory of 4216 2880 354c3e97d9d6a70851512d9a5e501610N.exe 100 PID 2880 wrote to memory of 4216 2880 354c3e97d9d6a70851512d9a5e501610N.exe 100 PID 4216 wrote to memory of 2904 4216 354c3e97d9d6a70851512d9a5e501610N.exe 101 PID 4216 wrote to memory of 2904 4216 354c3e97d9d6a70851512d9a5e501610N.exe 101 PID 4216 wrote to memory of 2904 4216 354c3e97d9d6a70851512d9a5e501610N.exe 101 PID 2904 wrote to memory of 3344 2904 354c3e97d9d6a70851512d9a5e501610N.exe 102 PID 2904 wrote to memory of 3344 2904 354c3e97d9d6a70851512d9a5e501610N.exe 102 PID 2904 wrote to memory of 3344 2904 354c3e97d9d6a70851512d9a5e501610N.exe 102 PID 3344 wrote to memory of 1648 3344 354c3e97d9d6a70851512d9a5e501610N.exe 103 PID 3344 wrote to memory of 1648 3344 354c3e97d9d6a70851512d9a5e501610N.exe 103 PID 3344 wrote to memory of 1648 3344 354c3e97d9d6a70851512d9a5e501610N.exe 103 PID 1648 wrote to memory of 4632 1648 354c3e97d9d6a70851512d9a5e501610N.exe 104 PID 1648 wrote to memory of 4632 1648 354c3e97d9d6a70851512d9a5e501610N.exe 104 PID 1648 wrote to memory of 4632 1648 354c3e97d9d6a70851512d9a5e501610N.exe 104 PID 4632 wrote to memory of 4832 4632 354c3e97d9d6a70851512d9a5e501610N.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"18⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"19⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"20⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"24⤵
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"26⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"28⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:784 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"29⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"30⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"31⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"32⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"33⤵
- Drops file in Program Files directory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"34⤵
- Drops file in Program Files directory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"35⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"36⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"37⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"38⤵
- Drops file in Program Files directory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"39⤵
- Drops file in Program Files directory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"40⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"41⤵
- Drops file in Program Files directory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"42⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"43⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"44⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"45⤵
- Drops file in Program Files directory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"46⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"47⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"48⤵
- Drops file in Program Files directory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"49⤵
- Drops file in Program Files directory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"50⤵
- Drops file in Program Files directory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"51⤵
- Drops file in Program Files directory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"52⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"53⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"54⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"55⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"56⤵
- Drops file in Program Files directory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"57⤵
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"58⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"59⤵
- Drops file in Program Files directory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"60⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"61⤵
- Drops file in Program Files directory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"62⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"63⤵
- Drops file in Program Files directory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"64⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"65⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"66⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"67⤵
- Drops file in Program Files directory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"68⤵
- Drops file in Program Files directory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"69⤵
- Drops file in Program Files directory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"70⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"71⤵
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"72⤵
- Drops file in Program Files directory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"73⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"74⤵
- Drops file in Program Files directory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"75⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"76⤵
- Drops file in Program Files directory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"77⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"78⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"79⤵
- System Location Discovery: System Language Discovery
PID:436 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"80⤵
- Drops file in Program Files directory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"81⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"82⤵
- Drops file in Program Files directory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"83⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"84⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"85⤵
- Drops file in Program Files directory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"86⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"87⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"88⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"89⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"90⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"91⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"92⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"93⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"94⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"95⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"96⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"97⤵
- System Location Discovery: System Language Discovery
PID:5152 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"98⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"99⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"100⤵
- System Location Discovery: System Language Discovery
PID:5200 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"101⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"102⤵PID:5232
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"103⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"104⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"105⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"106⤵PID:5292
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"107⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"108⤵PID:5336
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"109⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"110⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"111⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"112⤵
- System Location Discovery: System Language Discovery
PID:5400 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"113⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"114⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"115⤵
- System Location Discovery: System Language Discovery
PID:5452 -
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"116⤵PID:5468
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"117⤵PID:5484
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"118⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"119⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"120⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"121⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"C:\Users\Admin\AppData\Local\Temp\354c3e97d9d6a70851512d9a5e501610N.exe"122⤵PID:5580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-