Analysis
-
max time kernel
91s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:30
Behavioral task
behavioral1
Sample
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe
Resource
win10v2004-20220901-en
General
-
Target
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe
-
Size
2.0MB
-
MD5
6a9ecae73e03c232e6a8a2fd7721aadb
-
SHA1
ccb49814d1d47518383d07479683cc3d4d86e8df
-
SHA256
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685
-
SHA512
54eab337adf92625c90c5b429f08cb41ac40ed8aa4d44f6f008a086e691f856dd45a7cbfd7464cd39d9808b012c248a2af23e12ea8d1cd96c3b9e12498b6022d
-
SSDEEP
24576:yDyTFtjBDyTFtjsDyTFtjBDyTFtjmDyTFtjBDyTFtjtDyTFtjBDyTFtjsDyTFtjB:/tqthtqtHtqt+tqthtqtHtqt
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2404 tmp240565968.exe 804 tmp240566015.exe 224 tmp240566125.exe 1360 tmp240566218.exe 3524 notpad.exe 1992 tmp240567140.exe 2600 tmp240567234.exe 4052 notpad.exe 4884 tmp240567718.exe 2224 tmp240567921.exe 856 notpad.exe 3832 tmp240568296.exe 3492 tmp240568359.exe 948 notpad.exe 3900 tmp240568734.exe 3768 tmp240568765.exe 4088 notpad.exe 928 tmp240569734.exe 2960 tmp240569812.exe 4876 notpad.exe 4232 tmp240570156.exe 2940 tmp240570203.exe 752 notpad.exe 1328 tmp240570593.exe 396 tmp240570656.exe 2272 notpad.exe 1172 tmp240571046.exe 1668 tmp240571125.exe 1836 notpad.exe 2328 tmp240571468.exe 540 tmp240571515.exe 4924 notpad.exe 4420 tmp240571937.exe 3796 tmp240572296.exe 1520 notpad.exe 2332 tmp240572546.exe 4660 tmp240572578.exe 4680 notpad.exe 3160 tmp240572843.exe 4448 tmp240572859.exe 4156 notpad.exe 3952 tmp240573093.exe 1904 tmp240573125.exe 2644 notpad.exe 5108 tmp240573343.exe 3892 tmp240573375.exe 2320 notpad.exe 800 tmp240573593.exe 804 tmp240573625.exe 828 notpad.exe 3416 tmp240573828.exe 1948 tmp240573859.exe 1352 notpad.exe 3508 tmp240574078.exe 3496 tmp240574109.exe 3792 notpad.exe 2540 tmp240574359.exe 4812 tmp240574375.exe 2368 notpad.exe 4144 tmp240574609.exe 908 tmp240574625.exe 1388 notpad.exe 720 tmp240575406.exe 3492 tmp240575437.exe -
resource yara_rule behavioral2/files/0x0002000000022e63-136.dat upx behavioral2/files/0x0002000000022e63-138.dat upx behavioral2/memory/4316-137-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/804-144-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-148.dat upx behavioral2/files/0x0002000000022e6e-149.dat upx behavioral2/files/0x0001000000022e6c-153.dat upx behavioral2/memory/3524-157-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-159.dat upx behavioral2/memory/4052-160-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022e6c-164.dat upx behavioral2/memory/4052-168-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-170.dat upx behavioral2/memory/856-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022e6c-175.dat upx behavioral2/files/0x0002000000022e6e-180.dat upx behavioral2/memory/948-186-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022e6c-184.dat upx behavioral2/memory/948-189-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-191.dat upx behavioral2/files/0x0001000000022e6c-196.dat upx behavioral2/memory/4088-199-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-201.dat upx behavioral2/memory/4876-209-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022e6c-206.dat upx behavioral2/files/0x0002000000022e6e-211.dat upx behavioral2/files/0x0001000000022e6c-216.dat upx behavioral2/memory/752-219-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-221.dat upx behavioral2/files/0x0001000000022e6c-225.dat upx behavioral2/memory/2272-229-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-231.dat upx behavioral2/files/0x0001000000022e6c-236.dat upx behavioral2/memory/1836-239-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022e6e-241.dat upx behavioral2/memory/4924-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4924-245-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1520-249-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4680-253-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4156-257-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2644-261-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2320-265-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/828-269-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1352-271-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1352-274-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3792-278-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2368-282-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2368-283-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1388-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4992-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4188-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/404-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2212-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2984-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1972-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3528-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1752-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4720-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3756-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2972-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2820-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4756-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4028-301-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5108-302-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 62 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579968.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585875.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240571937.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573828.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579703.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240572546.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581875.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580171.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240582093.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240582781.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585156.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586625.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240575703.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240576234.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579437.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240574609.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240582562.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584953.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240567718.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240570156.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240571468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240568296.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584718.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585640.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240571046.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240582328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240583781.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581625.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584250.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584484.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240572843.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584015.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240568734.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240576718.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240577984.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586875.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240569734.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573593.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578953.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240574359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240583500.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240576968.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240577500.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578218.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240574078.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240576468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240577171.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581031.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240567140.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240570593.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573093.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587109.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240575953.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581281.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578718.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579187.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240565968.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573343.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240575406.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240570593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240573828.exe File created C:\Windows\SysWOW64\notpad.exe tmp240583781.exe File created C:\Windows\SysWOW64\notpad.exe tmp240585875.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240586875.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240580171.exe File created C:\Windows\SysWOW64\notpad.exe tmp240565968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240573828.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240574609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240575406.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240576234.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240577984.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240579187.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240580468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240584718.exe File created C:\Windows\SysWOW64\notpad.exe tmp240585156.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240586625.exe File created C:\Windows\SysWOW64\notpad.exe tmp240571468.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240573093.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240573828.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240575703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240578218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240584953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240569734.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240576968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240577500.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240573343.exe File created C:\Windows\SysWOW64\notpad.exe tmp240581875.exe File created C:\Windows\SysWOW64\notpad.exe tmp240584484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240581281.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240568296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240573343.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240576718.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240577500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240577500.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240577984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240579968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240582093.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240582781.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584250.exe File created C:\Windows\SysWOW64\notpad.exe tmp240586625.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240565968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240567718.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240581281.exe File created C:\Windows\SysWOW64\notpad.exe tmp240582328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240584015.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240567140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240568296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240576234.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240571937.exe File created C:\Windows\SysWOW64\notpad.exe tmp240574078.exe File created C:\Windows\SysWOW64\notpad.exe tmp240578468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240583500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240587109.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240579703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240579968.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240585640.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240570156.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240575953.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240578468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240579703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240581031.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3400 1360 WerFault.exe 85 -
Modifies registry class 62 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240581031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240568296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240581281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240569734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240565968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240581625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240567140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240581875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240567718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240568734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583500.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 2404 4316 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 82 PID 4316 wrote to memory of 2404 4316 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 82 PID 4316 wrote to memory of 2404 4316 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 82 PID 4316 wrote to memory of 804 4316 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 83 PID 4316 wrote to memory of 804 4316 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 83 PID 4316 wrote to memory of 804 4316 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 83 PID 804 wrote to memory of 224 804 tmp240566015.exe 84 PID 804 wrote to memory of 224 804 tmp240566015.exe 84 PID 804 wrote to memory of 224 804 tmp240566015.exe 84 PID 804 wrote to memory of 1360 804 tmp240566015.exe 85 PID 804 wrote to memory of 1360 804 tmp240566015.exe 85 PID 804 wrote to memory of 1360 804 tmp240566015.exe 85 PID 2404 wrote to memory of 3524 2404 tmp240565968.exe 89 PID 2404 wrote to memory of 3524 2404 tmp240565968.exe 89 PID 2404 wrote to memory of 3524 2404 tmp240565968.exe 89 PID 3524 wrote to memory of 1992 3524 notpad.exe 90 PID 3524 wrote to memory of 1992 3524 notpad.exe 90 PID 3524 wrote to memory of 1992 3524 notpad.exe 90 PID 3524 wrote to memory of 2600 3524 notpad.exe 91 PID 3524 wrote to memory of 2600 3524 notpad.exe 91 PID 3524 wrote to memory of 2600 3524 notpad.exe 91 PID 1992 wrote to memory of 4052 1992 tmp240567140.exe 92 PID 1992 wrote to memory of 4052 1992 tmp240567140.exe 92 PID 1992 wrote to memory of 4052 1992 tmp240567140.exe 92 PID 4052 wrote to memory of 4884 4052 notpad.exe 93 PID 4052 wrote to memory of 4884 4052 notpad.exe 93 PID 4052 wrote to memory of 4884 4052 notpad.exe 93 PID 4052 wrote to memory of 2224 4052 notpad.exe 94 PID 4052 wrote to memory of 2224 4052 notpad.exe 94 PID 4052 wrote to memory of 2224 4052 notpad.exe 94 PID 4884 wrote to memory of 856 4884 tmp240567718.exe 95 PID 4884 wrote to memory of 856 4884 tmp240567718.exe 95 PID 4884 wrote to memory of 856 4884 tmp240567718.exe 95 PID 856 wrote to memory of 3832 856 notpad.exe 96 PID 856 wrote to memory of 3832 856 notpad.exe 96 PID 856 wrote to memory of 3832 856 notpad.exe 96 PID 856 wrote to memory of 3492 856 notpad.exe 97 PID 856 wrote to memory of 3492 856 notpad.exe 97 PID 856 wrote to memory of 3492 856 notpad.exe 97 PID 3832 wrote to memory of 948 3832 tmp240568296.exe 98 PID 3832 wrote to memory of 948 3832 tmp240568296.exe 98 PID 3832 wrote to memory of 948 3832 tmp240568296.exe 98 PID 948 wrote to memory of 3900 948 notpad.exe 99 PID 948 wrote to memory of 3900 948 notpad.exe 99 PID 948 wrote to memory of 3900 948 notpad.exe 99 PID 948 wrote to memory of 3768 948 notpad.exe 100 PID 948 wrote to memory of 3768 948 notpad.exe 100 PID 948 wrote to memory of 3768 948 notpad.exe 100 PID 3900 wrote to memory of 4088 3900 tmp240568734.exe 101 PID 3900 wrote to memory of 4088 3900 tmp240568734.exe 101 PID 3900 wrote to memory of 4088 3900 tmp240568734.exe 101 PID 4088 wrote to memory of 928 4088 notpad.exe 102 PID 4088 wrote to memory of 928 4088 notpad.exe 102 PID 4088 wrote to memory of 928 4088 notpad.exe 102 PID 4088 wrote to memory of 2960 4088 notpad.exe 103 PID 4088 wrote to memory of 2960 4088 notpad.exe 103 PID 4088 wrote to memory of 2960 4088 notpad.exe 103 PID 928 wrote to memory of 4876 928 tmp240569734.exe 104 PID 928 wrote to memory of 4876 928 tmp240569734.exe 104 PID 928 wrote to memory of 4876 928 tmp240569734.exe 104 PID 4876 wrote to memory of 4232 4876 notpad.exe 105 PID 4876 wrote to memory of 4232 4876 notpad.exe 105 PID 4876 wrote to memory of 4232 4876 notpad.exe 105 PID 4876 wrote to memory of 2940 4876 notpad.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe"C:\Users\Admin\AppData\Local\Temp\b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\tmp240565968.exeC:\Users\Admin\AppData\Local\Temp\tmp240565968.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\tmp240567140.exeC:\Users\Admin\AppData\Local\Temp\tmp240567140.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\tmp240567718.exeC:\Users\Admin\AppData\Local\Temp\tmp240567718.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\tmp240568296.exeC:\Users\Admin\AppData\Local\Temp\tmp240568296.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\tmp240568734.exeC:\Users\Admin\AppData\Local\Temp\tmp240568734.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\tmp240569734.exeC:\Users\Admin\AppData\Local\Temp\tmp240569734.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\tmp240570156.exeC:\Users\Admin\AppData\Local\Temp\tmp240570156.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4232 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\tmp240570593.exeC:\Users\Admin\AppData\Local\Temp\tmp240570593.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\tmp240571046.exeC:\Users\Admin\AppData\Local\Temp\tmp240571046.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1172 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\tmp240571468.exeC:\Users\Admin\AppData\Local\Temp\tmp240571468.exe20⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2328 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\tmp240571937.exeC:\Users\Admin\AppData\Local\Temp\tmp240571937.exe22⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\tmp240572546.exeC:\Users\Admin\AppData\Local\Temp\tmp240572546.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:2332 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\tmp240572843.exeC:\Users\Admin\AppData\Local\Temp\tmp240572843.exe26⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3160 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\tmp240573093.exeC:\Users\Admin\AppData\Local\Temp\tmp240573093.exe28⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\tmp240573343.exeC:\Users\Admin\AppData\Local\Temp\tmp240573343.exe30⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\tmp240573593.exeC:\Users\Admin\AppData\Local\Temp\tmp240573593.exe32⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:800 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\tmp240573828.exeC:\Users\Admin\AppData\Local\Temp\tmp240573828.exe34⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3416 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\tmp240574078.exeC:\Users\Admin\AppData\Local\Temp\tmp240574078.exe36⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\tmp240574359.exeC:\Users\Admin\AppData\Local\Temp\tmp240574359.exe38⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\tmp240574609.exeC:\Users\Admin\AppData\Local\Temp\tmp240574609.exe40⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\tmp240575406.exeC:\Users\Admin\AppData\Local\Temp\tmp240575406.exe42⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:720 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\tmp240575703.exeC:\Users\Admin\AppData\Local\Temp\tmp240575703.exe44⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\tmp240575953.exeC:\Users\Admin\AppData\Local\Temp\tmp240575953.exe46⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\tmp240576234.exeC:\Users\Admin\AppData\Local\Temp\tmp240576234.exe48⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\tmp240576468.exeC:\Users\Admin\AppData\Local\Temp\tmp240576468.exe50⤵
- Checks computer location settings
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\tmp240576718.exeC:\Users\Admin\AppData\Local\Temp\tmp240576718.exe52⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4876 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\tmp240576968.exeC:\Users\Admin\AppData\Local\Temp\tmp240576968.exe54⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2016 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\tmp240577171.exeC:\Users\Admin\AppData\Local\Temp\tmp240577171.exe56⤵
- Checks computer location settings
- Modifies registry class
PID:4748 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\tmp240577500.exeC:\Users\Admin\AppData\Local\Temp\tmp240577500.exe58⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\tmp240577984.exeC:\Users\Admin\AppData\Local\Temp\tmp240577984.exe60⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\tmp240578218.exeC:\Users\Admin\AppData\Local\Temp\tmp240578218.exe62⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1244 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\tmp240578468.exeC:\Users\Admin\AppData\Local\Temp\tmp240578468.exe64⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\tmp240578718.exeC:\Users\Admin\AppData\Local\Temp\tmp240578718.exe66⤵
- Checks computer location settings
- Modifies registry class
PID:1520 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\tmp240578953.exeC:\Users\Admin\AppData\Local\Temp\tmp240578953.exe68⤵
- Checks computer location settings
- Modifies registry class
PID:380 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\tmp240579187.exeC:\Users\Admin\AppData\Local\Temp\tmp240579187.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\tmp240579437.exeC:\Users\Admin\AppData\Local\Temp\tmp240579437.exe72⤵
- Checks computer location settings
- Modifies registry class
PID:4304 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\tmp240579703.exeC:\Users\Admin\AppData\Local\Temp\tmp240579703.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2320 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\tmp240579968.exeC:\Users\Admin\AppData\Local\Temp\tmp240579968.exe76⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3788 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\tmp240580171.exeC:\Users\Admin\AppData\Local\Temp\tmp240580171.exe78⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\tmp240580468.exeC:\Users\Admin\AppData\Local\Temp\tmp240580468.exe80⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3792 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\tmp240581031.exeC:\Users\Admin\AppData\Local\Temp\tmp240581031.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\tmp240581281.exeC:\Users\Admin\AppData\Local\Temp\tmp240581281.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4188 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\tmp240581625.exeC:\Users\Admin\AppData\Local\Temp\tmp240581625.exe86⤵
- Checks computer location settings
- Modifies registry class
PID:2960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\tmp240581875.exeC:\Users\Admin\AppData\Local\Temp\tmp240581875.exe88⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\tmp240582093.exeC:\Users\Admin\AppData\Local\Temp\tmp240582093.exe90⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2236 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\tmp240582328.exeC:\Users\Admin\AppData\Local\Temp\tmp240582328.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3452 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\tmp240582562.exeC:\Users\Admin\AppData\Local\Temp\tmp240582562.exe94⤵
- Checks computer location settings
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\tmp240582781.exeC:\Users\Admin\AppData\Local\Temp\tmp240582781.exe96⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4832 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\tmp240583500.exeC:\Users\Admin\AppData\Local\Temp\tmp240583500.exe98⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\tmp240583781.exeC:\Users\Admin\AppData\Local\Temp\tmp240583781.exe100⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3260 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\tmp240584015.exeC:\Users\Admin\AppData\Local\Temp\tmp240584015.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1244 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\tmp240584250.exeC:\Users\Admin\AppData\Local\Temp\tmp240584250.exe104⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\tmp240584484.exeC:\Users\Admin\AppData\Local\Temp\tmp240584484.exe106⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3920 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\tmp240584718.exeC:\Users\Admin\AppData\Local\Temp\tmp240584718.exe108⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\tmp240584953.exeC:\Users\Admin\AppData\Local\Temp\tmp240584953.exe110⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4264 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\tmp240585156.exeC:\Users\Admin\AppData\Local\Temp\tmp240585156.exe112⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4492 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\tmp240585359.exeC:\Users\Admin\AppData\Local\Temp\tmp240585359.exe114⤵
- Checks computer location settings
- Modifies registry class
PID:3148 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\tmp240585640.exeC:\Users\Admin\AppData\Local\Temp\tmp240585640.exe116⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3064 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\tmp240585875.exeC:\Users\Admin\AppData\Local\Temp\tmp240585875.exe118⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\tmp240586625.exeC:\Users\Admin\AppData\Local\Temp\tmp240586625.exe120⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4884 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\tmp240586875.exeC:\Users\Admin\AppData\Local\Temp\tmp240586875.exe122⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-