Overview
overview
10Static
static
3-°¦n+¦++.exe
windows7-x64
1-°¦n+¦++.exe
windows10-2004-x64
1PC远控测试-.exe
windows7-x64
1PC远控测试-.exe
windows10-2004-x64
3vip文件�...��.exe
windows7-x64
10vip文件�...��.exe
windows10-2004-x64
10菲律宾�...P4.exe
windows7-x64
6菲律宾�...P4.exe
windows10-2004-x64
6远程控�...2).exe
windows7-x64
3远程控�...2).exe
windows10-2004-x64
3远程控�...2).exe
windows7-x64
3远程控�...2).exe
windows10-2004-x64
3远程控�...�-.exe
windows7-x64
3远程控�...�-.exe
windows10-2004-x64
3远程控�...�-.exe
windows7-x64
3远程控�...�-.exe
windows10-2004-x64
3钱包收�...2).exe
windows7-x64
3钱包收�...2).exe
windows10-2004-x64
3钱包收�...�-.exe
windows7-x64
3钱包收�...�-.exe
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 21:27
Behavioral task
behavioral1
Sample
-°¦n+¦++.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
-°¦n+¦++.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
PC远控测试-.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
PC远控测试-.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
vip文件捆绑器.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
vip文件捆绑器.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
远程控制 测试- (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
远程控制 测试- (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
远程控制 测试- (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
远程控制 测试- (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
远程控制 测试-.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
远程控制 测试-.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
远程控制 测试-.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
远程控制 测试-.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
钱包收款地址强制更改器- (2).exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
钱包收款地址强制更改器- (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
钱包收款地址强制更改器-.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
钱包收款地址强制更改器-.exe
Resource
win10v2004-20241007-en
General
-
Target
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
-
Size
340KB
-
MD5
f2b6aae38b2a7d7eccd29f0293420d72
-
SHA1
da9209e98438a66c6453010f65e2b5c427382963
-
SHA256
db0c34fd60009271f420ab7adaf04d4476d7939892b217930fffcb9757be60e2
-
SHA512
d3c49e2d6fb731c747144e1bb301f390aeb34b1e399c841bc76287519d6ad13cb34e4a3ae24986b0f43e94c31d40e357d51d360a436b7651a4d539c8fad99951
-
SSDEEP
6144:uAtrKrjDnYCADp9VekbJ2tPJKA1jImwa6mcF:DmYpDFbJ2s0jIxmc
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\getip = "C:\\Users\\Admin\\AppData\\Local\\Temp\\??????????????????.MP4.exe" 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cdefgh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\??????????????????.MP4.exe" 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe Token: SeDebugPrivilege 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2580 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 29 PID 2408 wrote to memory of 2580 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 29 PID 2408 wrote to memory of 2580 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 29 PID 2408 wrote to memory of 2580 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 29 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2308 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 30 PID 2408 wrote to memory of 2308 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 30 PID 2408 wrote to memory of 2308 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 30 PID 2408 wrote to memory of 2308 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 30 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2944 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 31 PID 2408 wrote to memory of 2944 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 31 PID 2408 wrote to memory of 2944 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 31 PID 2408 wrote to memory of 2944 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 31 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 3004 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 32 PID 2408 wrote to memory of 3004 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 32 PID 2408 wrote to memory of 3004 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 32 PID 2408 wrote to memory of 3004 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 32 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2224 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 33 PID 2408 wrote to memory of 2224 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 33 PID 2408 wrote to memory of 2224 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 33 PID 2408 wrote to memory of 2224 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 33 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2880 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 34 PID 2408 wrote to memory of 2880 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 34 PID 2408 wrote to memory of 2880 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 34 PID 2408 wrote to memory of 2880 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 34 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 1760 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 35 PID 2408 wrote to memory of 1760 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 35 PID 2408 wrote to memory of 1760 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 35 PID 2408 wrote to memory of 1760 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 35 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2652 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 36 PID 2408 wrote to memory of 2652 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 36 PID 2408 wrote to memory of 2652 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 36 PID 2408 wrote to memory of 2652 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 36 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 2716 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 37 PID 2408 wrote to memory of 2716 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 37 PID 2408 wrote to memory of 2716 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 37 PID 2408 wrote to memory of 2716 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 37 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 316 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 28 PID 2408 wrote to memory of 1928 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 38 PID 2408 wrote to memory of 1928 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 38 PID 2408 wrote to memory of 1928 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 38 PID 2408 wrote to memory of 1928 2408 菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe"C:\Users\Admin\AppData\Local\Temp\菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵PID:316
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2580
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2308
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2944
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3004
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1760
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2652
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2716
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1928
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2532
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2500
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2568
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:384
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1820
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:684
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1964
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2548
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2196
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2360
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2480
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:580
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:972
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1780
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2104
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2152
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:764
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1728
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3000
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2184
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2688
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2020
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1940
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2832
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2592
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1128
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:604
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1052
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:792
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2384
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3024
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1100
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2892
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2964
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2636
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2708
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2516
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1600
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2724
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:688
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:900
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2132
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2188
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1792
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2840
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2852
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:536
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:864
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2908
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1936
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2644
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:628
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1988
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:852
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:968
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:760
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2028
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1492
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2696
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1924
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:620
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:320
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:296
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1000
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2608
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:2256
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3068
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1152
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3104
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3144
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3184
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3224
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3344
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3380
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3424
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3468
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3508
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:3548
-
-
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵
- System Location Discovery: System Language Discovery
PID:3588
-