Analysis
-
max time kernel
7s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 14:23
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Boostrapper.exe
Resource
win10v2004-20241007-en
General
-
Target
Boostrapper.exe
-
Size
28.6MB
-
MD5
dce9cff74b9d9bab6a5986013aec628e
-
SHA1
b815990c20f978888cbf1d09a31f374423785d0b
-
SHA256
146e60d8dc75128cfd31cd96f589e53224637b76473ebb64a920a4d9da0eccc2
-
SHA512
a4cd1c4ebc9937b0f902660e067028cba11ae1a14332ea0948e74e9a270668ece765f0f1462d34ade757cc04ac634bdb171ff8b980b1a04f9bccca01a130411b
-
SSDEEP
786432:GhQiXgPQEErUlqsA3XTg5MS57vDACrv3Fqbqx:iQE89Ed3XTg5MS57v0eqbQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 20 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Boostrapper.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOTSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOTSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation BOOSTRAPPER.EXE -
Executes dropped EXE 18 IoCs
pid Process 4664 BOOTSTRAPPER.EXE 4400 BOOTSTRAPPER.EXE 5096 BOOTSTRAPPER.EXE 3760 BOOTSTRAPPER.EXE 4240 BOOTSTRAPPER.EXE 2692 BOOTSTRAPPER.EXE 1432 BOOTSTRAPPER.EXE 1348 BOOTSTRAPPER.EXE 4816 BOOTSTRAPPER.EXE 4012 BOOTSTRAPPER.EXE 5052 BOOTSTRAPPER.EXE 3208 BOOTSTRAPPER.EXE 4340 BOOTSTRAPPER.EXE 624 BOOTSTRAPPER.EXE 3748 BOOTSTRAPPER.EXE 2644 BOOTSTRAPPER.EXE 1132 BOOTSTRAPPER.EXE 4752 BOOTSTRAPPER.EXE -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 1.0.0.1 Destination IP 1.0.0.1 Destination IP 1.0.0.1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 268 pastebin.com 312 pastebin.com 422 pastebin.com 479 pastebin.com 577 pastebin.com 793 pastebin.com 14 pastebin.com 161 pastebin.com 197 pastebin.com 445 pastebin.com 713 pastebin.com 840 pastebin.com 113 pastebin.com 185 pastebin.com 324 pastebin.com 357 pastebin.com 394 pastebin.com 507 pastebin.com 576 pastebin.com 765 pastebin.com 16 pastebin.com 98 pastebin.com 200 pastebin.com 277 pastebin.com 286 pastebin.com 436 pastebin.com 472 pastebin.com 556 pastebin.com 81 pastebin.com 93 pastebin.com 700 pastebin.com 837 pastebin.com 131 pastebin.com 149 pastebin.com 210 pastebin.com 385 pastebin.com 428 pastebin.com 501 pastebin.com 62 pastebin.com 69 pastebin.com 791 pastebin.com 797 pastebin.com 152 pastebin.com 204 pastebin.com 342 pastebin.com 415 pastebin.com 525 pastebin.com 564 pastebin.com 41 pastebin.com 126 pastebin.com 785 pastebin.com 825 pastebin.com 838 pastebin.com 674 pastebin.com 743 pastebin.com 515 pastebin.com 519 pastebin.com 615 pastebin.com 666 pastebin.com 677 pastebin.com 723 pastebin.com 239 pastebin.com 354 pastebin.com 803 pastebin.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boostrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BOOSTRAPPER.EXE -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1268 ipconfig.exe 1932 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4664 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 4400 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 5096 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 3760 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 4240 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 2692 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 1432 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 1348 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 4816 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 4012 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 5052 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 3208 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 4340 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 624 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 3748 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 2644 BOOTSTRAPPER.EXE Token: SeDebugPrivilege 1132 BOOTSTRAPPER.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4260 1200 Boostrapper.exe 85 PID 1200 wrote to memory of 4260 1200 Boostrapper.exe 85 PID 1200 wrote to memory of 4260 1200 Boostrapper.exe 85 PID 1200 wrote to memory of 4664 1200 Boostrapper.exe 86 PID 1200 wrote to memory of 4664 1200 Boostrapper.exe 86 PID 4260 wrote to memory of 1748 4260 BOOSTRAPPER.EXE 126 PID 4260 wrote to memory of 1748 4260 BOOSTRAPPER.EXE 126 PID 4260 wrote to memory of 1748 4260 BOOSTRAPPER.EXE 126 PID 4260 wrote to memory of 4400 4260 BOOSTRAPPER.EXE 89 PID 4260 wrote to memory of 4400 4260 BOOSTRAPPER.EXE 89 PID 1748 wrote to memory of 2372 1748 BOOSTRAPPER.EXE 258 PID 1748 wrote to memory of 2372 1748 BOOSTRAPPER.EXE 258 PID 1748 wrote to memory of 2372 1748 BOOSTRAPPER.EXE 258 PID 1748 wrote to memory of 5096 1748 BOOSTRAPPER.EXE 92 PID 1748 wrote to memory of 5096 1748 BOOSTRAPPER.EXE 92 PID 2372 wrote to memory of 2864 2372 BOOSTRAPPER.EXE 203 PID 2372 wrote to memory of 2864 2372 BOOSTRAPPER.EXE 203 PID 2372 wrote to memory of 2864 2372 BOOSTRAPPER.EXE 203 PID 2372 wrote to memory of 3760 2372 BOOSTRAPPER.EXE 179 PID 2372 wrote to memory of 3760 2372 BOOSTRAPPER.EXE 179 PID 2864 wrote to memory of 3192 2864 BOOSTRAPPER.EXE 97 PID 2864 wrote to memory of 3192 2864 BOOSTRAPPER.EXE 97 PID 2864 wrote to memory of 3192 2864 BOOSTRAPPER.EXE 97 PID 2864 wrote to memory of 4240 2864 BOOSTRAPPER.EXE 200 PID 2864 wrote to memory of 4240 2864 BOOSTRAPPER.EXE 200 PID 3192 wrote to memory of 4172 3192 BOOSTRAPPER.EXE 535 PID 3192 wrote to memory of 4172 3192 BOOSTRAPPER.EXE 535 PID 3192 wrote to memory of 4172 3192 BOOSTRAPPER.EXE 535 PID 3192 wrote to memory of 2692 3192 BOOSTRAPPER.EXE 232 PID 3192 wrote to memory of 2692 3192 BOOSTRAPPER.EXE 232 PID 4172 wrote to memory of 3088 4172 BOOSTRAPPER.EXE 103 PID 4172 wrote to memory of 3088 4172 BOOSTRAPPER.EXE 103 PID 4172 wrote to memory of 3088 4172 BOOSTRAPPER.EXE 103 PID 4172 wrote to memory of 1432 4172 BOOSTRAPPER.EXE 337 PID 4172 wrote to memory of 1432 4172 BOOSTRAPPER.EXE 337 PID 3088 wrote to memory of 3132 3088 BOOSTRAPPER.EXE 287 PID 3088 wrote to memory of 3132 3088 BOOSTRAPPER.EXE 287 PID 3088 wrote to memory of 3132 3088 BOOSTRAPPER.EXE 287 PID 3088 wrote to memory of 1348 3088 BOOSTRAPPER.EXE 668 PID 3088 wrote to memory of 1348 3088 BOOSTRAPPER.EXE 668 PID 3132 wrote to memory of 4584 3132 BOOSTRAPPER.EXE 109 PID 3132 wrote to memory of 4584 3132 BOOSTRAPPER.EXE 109 PID 3132 wrote to memory of 4584 3132 BOOSTRAPPER.EXE 109 PID 3132 wrote to memory of 4816 3132 BOOSTRAPPER.EXE 891 PID 3132 wrote to memory of 4816 3132 BOOSTRAPPER.EXE 891 PID 4584 wrote to memory of 1400 4584 BOOSTRAPPER.EXE 112 PID 4584 wrote to memory of 1400 4584 BOOSTRAPPER.EXE 112 PID 4584 wrote to memory of 1400 4584 BOOSTRAPPER.EXE 112 PID 4584 wrote to memory of 4012 4584 BOOSTRAPPER.EXE 500 PID 4584 wrote to memory of 4012 4584 BOOSTRAPPER.EXE 500 PID 1400 wrote to memory of 2980 1400 BOOSTRAPPER.EXE 117 PID 1400 wrote to memory of 2980 1400 BOOSTRAPPER.EXE 117 PID 1400 wrote to memory of 2980 1400 BOOSTRAPPER.EXE 117 PID 1400 wrote to memory of 5052 1400 BOOSTRAPPER.EXE 889 PID 1400 wrote to memory of 5052 1400 BOOSTRAPPER.EXE 889 PID 2980 wrote to memory of 1748 2980 BOOSTRAPPER.EXE 907 PID 2980 wrote to memory of 1748 2980 BOOSTRAPPER.EXE 907 PID 2980 wrote to memory of 1748 2980 BOOSTRAPPER.EXE 907 PID 2980 wrote to memory of 3208 2980 BOOSTRAPPER.EXE 1255 PID 2980 wrote to memory of 3208 2980 BOOSTRAPPER.EXE 1255 PID 1748 wrote to memory of 2192 1748 BOOSTRAPPER.EXE 1258 PID 1748 wrote to memory of 2192 1748 BOOSTRAPPER.EXE 1258 PID 1748 wrote to memory of 2192 1748 BOOSTRAPPER.EXE 1258 PID 1748 wrote to memory of 4340 1748 BOOSTRAPPER.EXE 1071
Processes
-
C:\Users\Admin\AppData\Local\Temp\Boostrapper.exe"C:\Users\Admin\AppData\Local\Temp\Boostrapper.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"9⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"10⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"11⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"12⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"13⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"14⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"15⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"16⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"17⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"18⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"19⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"20⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"21⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"22⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"23⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"24⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"25⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"26⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"27⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"28⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"29⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"30⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"31⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"32⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"33⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"34⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"35⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"36⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"37⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"38⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"39⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"40⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"41⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"42⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"43⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"44⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"45⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"46⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"47⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"48⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"49⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"50⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"51⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"52⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"53⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"54⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"55⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"56⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"57⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"58⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"59⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"60⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"61⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"62⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"63⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"64⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"65⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"66⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"67⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"68⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"69⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"70⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"71⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"72⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"73⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"74⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"75⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"76⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"77⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"78⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"79⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"80⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"81⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"82⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"83⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"84⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"85⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"86⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"87⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"88⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"89⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"90⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"91⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"92⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"93⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"94⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"95⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"96⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"97⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"98⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"99⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"100⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"101⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"102⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"103⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"104⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"105⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"106⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"107⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"108⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"109⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"110⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"111⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"112⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"113⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"114⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"115⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"116⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"117⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"118⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"119⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"120⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"121⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"C:\Users\Admin\AppData\Local\Temp\BOOSTRAPPER.EXE"122⤵PID:1428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-