Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe
Resource
win7-20240729-en
General
-
Target
40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe
-
Size
3.2MB
-
MD5
caa260aea481ab01c250da052ec5ea00
-
SHA1
7118228a5cf719e93b6fe96063e3f6808e522e88
-
SHA256
40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885
-
SHA512
7831fd962c9833896341b16af980dc6d898617c76f751fe69c21a66b5770bd353239c467865c9e6a3f3496be3b6706842359bc4bc3eefc2d5ffafb0f3139a861
-
SSDEEP
49152:x2z8ewBYFWHVFExklYSZO3qkM9bHO7+3rt5O26DWsSVsW0bqKKCAcY:8FwWklYuO3S9C7s5O3ZSB0bqKTA
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe File opened for modification C:\Program Files\7-Zip\7z.exe 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe -
Program crash 64 IoCs
pid pid_target Process procid_target 5704 1096 WerFault.exe 138 6492 1096 WerFault.exe 138 6924 2900 WerFault.exe 148 7164 2900 WerFault.exe 148 7056 1100 WerFault.exe 146 7276 1100 WerFault.exe 146 7704 4628 WerFault.exe 142 7948 4628 WerFault.exe 142 3188 7404 WerFault.exe 340 7564 7404 WerFault.exe 340 7704 7416 WerFault.exe 341 396 7416 WerFault.exe 341 1876 7436 WerFault.exe 342 7252 7436 WerFault.exe 342 4228 7452 WerFault.exe 343 7564 7452 WerFault.exe 343 1736 7772 WerFault.exe 352 1972 7772 WerFault.exe 352 7808 7796 WerFault.exe 353 7648 7796 WerFault.exe 353 4876 7500 WerFault.exe 344 7952 7500 WerFault.exe 344 7252 7736 WerFault.exe 350 7484 7736 WerFault.exe 350 844 7720 WerFault.exe 349 4092 2236 WerFault.exe 116 7280 532 WerFault.exe 113 8884 6072 WerFault.exe 236 8876 5920 WerFault.exe 253 8860 5640 WerFault.exe 256 8804 5664 WerFault.exe 245 8404 2760 WerFault.exe 107 8676 5664 WerFault.exe 245 9204 5900 WerFault.exe 252 3864 6160 WerFault.exe 258 8544 2236 WerFault.exe 116 8332 5860 WerFault.exe 250 8336 5900 WerFault.exe 252 8380 6160 WerFault.exe 258 7312 5860 WerFault.exe 250 5024 6992 WerFault.exe 295 3212 9172 WerFault.exe 438 7916 9172 WerFault.exe 438 8968 6992 WerFault.exe 295 8316 6976 WerFault.exe 294 4724 6976 WerFault.exe 294 7592 3392 WerFault.exe 130 7576 3392 WerFault.exe 130 8876 6956 WerFault.exe 293 8936 6956 WerFault.exe 293 9752 2200 WerFault.exe 170 9780 4052 WerFault.exe 169 9508 4776 WerFault.exe 172 1532 4284 WerFault.exe 191 9844 2984 WerFault.exe 586 11092 6248 WerFault.exe 611 9448 10436 WerFault.exe 795 2424 10820 WerFault.exe 825 9780 9292 WerFault.exe 812 9552 10864 WerFault.exe 838 11016 10820 WerFault.exe 825 10724 7528 WerFault.exe 607 10216 8096 WerFault.exe 614 10224 9020 WerFault.exe 594 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2564 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2564 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4116 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4116 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3160 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3160 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4340 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4340 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1468 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1468 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4520 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4520 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2608 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2608 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4796 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4796 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3920 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3920 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1432 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1432 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4824 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4824 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3500 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3500 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 544 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 544 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2884 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2884 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3576 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3576 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1252 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1252 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1172 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 1172 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 404 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 404 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2648 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2648 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4364 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4364 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3376 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3376 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2240 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2240 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3864 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3864 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2280 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2280 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3020 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 3020 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2660 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2660 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2760 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2760 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 840 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 840 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4528 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4528 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2672 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2672 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2256 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 2256 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4400 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 4400 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2564 wrote to memory of 4116 2564 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 82 PID 2564 wrote to memory of 4116 2564 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 82 PID 2564 wrote to memory of 4116 2564 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 82 PID 4116 wrote to memory of 3160 4116 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 83 PID 4116 wrote to memory of 3160 4116 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 83 PID 4116 wrote to memory of 3160 4116 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 83 PID 3160 wrote to memory of 4340 3160 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 84 PID 3160 wrote to memory of 4340 3160 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 84 PID 3160 wrote to memory of 4340 3160 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 84 PID 4340 wrote to memory of 1468 4340 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 85 PID 4340 wrote to memory of 1468 4340 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 85 PID 4340 wrote to memory of 1468 4340 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 85 PID 1468 wrote to memory of 4520 1468 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 86 PID 1468 wrote to memory of 4520 1468 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 86 PID 1468 wrote to memory of 4520 1468 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 86 PID 4520 wrote to memory of 2608 4520 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 87 PID 4520 wrote to memory of 2608 4520 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 87 PID 4520 wrote to memory of 2608 4520 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 87 PID 2608 wrote to memory of 4796 2608 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 88 PID 2608 wrote to memory of 4796 2608 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 88 PID 2608 wrote to memory of 4796 2608 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 88 PID 4796 wrote to memory of 3920 4796 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 89 PID 4796 wrote to memory of 3920 4796 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 89 PID 4796 wrote to memory of 3920 4796 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 89 PID 3920 wrote to memory of 1432 3920 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 90 PID 3920 wrote to memory of 1432 3920 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 90 PID 3920 wrote to memory of 1432 3920 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 90 PID 1432 wrote to memory of 4824 1432 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 91 PID 1432 wrote to memory of 4824 1432 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 91 PID 1432 wrote to memory of 4824 1432 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 91 PID 4824 wrote to memory of 3500 4824 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 92 PID 4824 wrote to memory of 3500 4824 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 92 PID 4824 wrote to memory of 3500 4824 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 92 PID 3500 wrote to memory of 544 3500 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 93 PID 3500 wrote to memory of 544 3500 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 93 PID 3500 wrote to memory of 544 3500 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 93 PID 544 wrote to memory of 2884 544 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 94 PID 544 wrote to memory of 2884 544 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 94 PID 544 wrote to memory of 2884 544 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 94 PID 2884 wrote to memory of 3576 2884 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 95 PID 2884 wrote to memory of 3576 2884 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 95 PID 2884 wrote to memory of 3576 2884 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 95 PID 3576 wrote to memory of 1252 3576 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 96 PID 3576 wrote to memory of 1252 3576 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 96 PID 3576 wrote to memory of 1252 3576 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 96 PID 1252 wrote to memory of 1172 1252 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 97 PID 1252 wrote to memory of 1172 1252 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 97 PID 1252 wrote to memory of 1172 1252 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 97 PID 1172 wrote to memory of 404 1172 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 98 PID 1172 wrote to memory of 404 1172 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 98 PID 1172 wrote to memory of 404 1172 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 98 PID 404 wrote to memory of 2648 404 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 99 PID 404 wrote to memory of 2648 404 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 99 PID 404 wrote to memory of 2648 404 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 99 PID 2648 wrote to memory of 4364 2648 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 100 PID 2648 wrote to memory of 4364 2648 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 100 PID 2648 wrote to memory of 4364 2648 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 100 PID 4364 wrote to memory of 3376 4364 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 101 PID 4364 wrote to memory of 3376 4364 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 101 PID 4364 wrote to memory of 3376 4364 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 101 PID 3376 wrote to memory of 2240 3376 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 102 PID 3376 wrote to memory of 2240 3376 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 102 PID 3376 wrote to memory of 2240 3376 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 102 PID 2240 wrote to memory of 3864 2240 40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"18⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"19⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"20⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"24⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"25⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"26⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"27⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"28⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"29⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"30⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"31⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"32⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"33⤵
- Drops file in Program Files directory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"34⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"35⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"36⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"37⤵
- Drops file in Program Files directory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"38⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"39⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"40⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"41⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"42⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"43⤵
- Drops file in Program Files directory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"44⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"45⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"46⤵
- Drops file in Program Files directory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"47⤵
- Drops file in Program Files directory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"48⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"49⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"50⤵
- Drops file in Program Files directory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"51⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"52⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"53⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"54⤵
- Drops file in Program Files directory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"55⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"56⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"57⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"58⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"59⤵
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"60⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"61⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"62⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"63⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"64⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"65⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"66⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"67⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"68⤵
- Drops file in Program Files directory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"69⤵
- System Location Discovery: System Language Discovery
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"70⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"71⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"72⤵
- System Location Discovery: System Language Discovery
PID:940 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"73⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"74⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"75⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"76⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"77⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"78⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"79⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"80⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"81⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"82⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"83⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"84⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"85⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"86⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"87⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"88⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"89⤵
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"90⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"91⤵
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"92⤵
- Drops file in Program Files directory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"93⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"94⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"95⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"96⤵
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"97⤵
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"98⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"99⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"100⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"101⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"102⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"103⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:740 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"104⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"105⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"106⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"107⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"108⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"109⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"110⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"111⤵
- Drops file in Program Files directory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"112⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"113⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"114⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"115⤵
- Drops file in Program Files directory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"116⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"117⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"118⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"119⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"120⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"121⤵
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"C:\Users\Admin\AppData\Local\Temp\40060444b1a413f50a3d08a37ee51c799af94f314a189a57d9c3fb4b579b9885N.exe"122⤵PID:2228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-