Analysis
-
max time kernel
136s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe
Resource
win10v2004-20220812-en
General
-
Target
0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe
-
Size
368KB
-
MD5
043316ad86cdf1acab1eef2e6f10ac53
-
SHA1
2e5d324b72f6c4d35b33a1e64b726a32d1d15739
-
SHA256
0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110
-
SHA512
92c4a386f3cd683ef181e9d420edd43878aa10e7c8bdedff75b2c8a5b8828b6bae8e75f6aae4f834a41a0514cde448ec17cf5d53afafbfc28acc3fadadbc3ab1
-
SSDEEP
6144:oftdcNdPHPeftdcNdPCftdcNdPNPeftdcNSh5a0Y3q8gk76c:bdPHPFdPZdPNPFSy3SkGc
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4968 notpad.exe 5072 tmp240555140.exe 4432 tmp240555171.exe 1408 notpad.exe 3392 tmp240555453.exe 4512 tmp240555515.exe 1580 notpad.exe 4880 tmp240555796.exe 4796 tmp240555875.exe 4724 notpad.exe 2252 tmp240556203.exe 3268 tmp240556234.exe 4368 notpad.exe 1240 tmp240556515.exe 2632 tmp240556578.exe 3080 notpad.exe 4396 tmp240556781.exe 3052 tmp240556828.exe 1316 notpad.exe 176 tmp240557140.exe 2016 tmp240557203.exe 4228 notpad.exe 3476 tmp240557671.exe 3912 tmp240557703.exe 4568 notpad.exe 4356 tmp240558015.exe 4320 tmp240558046.exe 4112 notpad.exe 3356 tmp240558328.exe 4976 tmp240558359.exe 676 notpad.exe 4916 tmp240558640.exe 1172 tmp240558687.exe 2636 notpad.exe 1564 tmp240558968.exe 3428 notpad.exe 3668 tmp240558984.exe 3640 tmp240559171.exe 4620 tmp240559578.exe 3180 notpad.exe 1592 tmp240559796.exe 1924 tmp240559828.exe 4700 notpad.exe 5028 tmp240560093.exe 1112 tmp240560140.exe 3164 notpad.exe 2248 tmp240560359.exe 736 tmp240560390.exe 2224 notpad.exe 3472 tmp240560578.exe 1796 tmp240560671.exe 2584 notpad.exe 4204 tmp240560843.exe 728 tmp240560859.exe 460 notpad.exe 3284 tmp240561046.exe 3352 tmp240561062.exe 2596 notpad.exe 2972 tmp240561250.exe 4352 notpad.exe 4104 tmp240576031.exe 5056 tmp240577687.exe 5072 tmp240575875.exe 4512 notpad.exe -
resource yara_rule behavioral2/files/0x0007000000022e34-133.dat upx behavioral2/files/0x0007000000022e34-134.dat upx behavioral2/files/0x0009000000022e01-139.dat upx behavioral2/memory/4968-142-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-144.dat upx behavioral2/files/0x0009000000022e01-149.dat upx behavioral2/memory/1408-152-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-154.dat upx behavioral2/files/0x0009000000022e01-158.dat upx behavioral2/memory/1580-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-164.dat upx behavioral2/memory/4724-172-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0009000000022e01-169.dat upx behavioral2/files/0x0007000000022e34-174.dat upx behavioral2/memory/4368-182-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0009000000022e01-178.dat upx behavioral2/files/0x0007000000022e34-184.dat upx behavioral2/files/0x0009000000022e01-188.dat upx behavioral2/memory/3080-192-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-194.dat upx behavioral2/files/0x0009000000022e01-198.dat upx behavioral2/memory/1316-200-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1316-203-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-205.dat upx behavioral2/memory/4228-213-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0009000000022e01-210.dat upx behavioral2/files/0x0007000000022e34-215.dat upx behavioral2/files/0x0009000000022e01-220.dat upx behavioral2/memory/4568-223-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-225.dat upx behavioral2/files/0x0009000000022e01-230.dat upx behavioral2/memory/4112-233-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e34-235.dat upx behavioral2/memory/676-240-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2636-244-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3428-245-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2636-248-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3428-250-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3180-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4700-258-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3164-262-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2224-266-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2584-270-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/460-274-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2596-276-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4352-279-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4352-283-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2596-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4512-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3972-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4880-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4232-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2624-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3700-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2312-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3916-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3940-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3916-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3940-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5088-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1740-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2692-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2328-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4312-301-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240668125.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240673109.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240685234.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240681109.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240679203.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240684968.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240645687.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240595953.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240665312.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240681296.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240560843.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240578156.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240597265.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240597531.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240662937.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240667296.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240681890.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240682546.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240558968.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240595062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240673656.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240684046.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240559171.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240596484.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240676703.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240683546.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240600062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240611031.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240667031.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240646875.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240669218.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240672140.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240675421.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240683000.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240555796.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240579875.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240603625.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240669015.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240670250.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240561046.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240603437.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240678812.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240683859.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240595437.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240601296.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240678796.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240685203.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240601609.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240652921.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240632906.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240648312.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240682687.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240558015.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240598625.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240605500.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240669734.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240557671.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240592406.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240666203.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240671921.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240555140.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240576031.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240642890.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240667031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240667296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240675687.exe File created C:\Windows\SysWOW64\notpad.exe tmp240598921.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240632906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240642890.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240657812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240657812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240680781.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240557671.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240558968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240595953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240596140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240598015.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240599468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240666796.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240644703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240685156.exe File created C:\Windows\SysWOW64\notpad.exe tmp240576031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240645437.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240672640.exe File created C:\Windows\SysWOW64\notpad.exe tmp240673296.exe File created C:\Windows\SysWOW64\notpad.exe tmp240673968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240680781.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240682687.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240560093.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240596484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240600921.exe File created C:\Windows\SysWOW64\notpad.exe tmp240646046.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240668359.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240679203.exe File created C:\Windows\SysWOW64\notpad.exe tmp240597531.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240682687.exe File created C:\Windows\SysWOW64\notpad.exe tmp240599468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240607703.exe File created C:\Windows\SysWOW64\notpad.exe tmp240665968.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240675421.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240645687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240560578.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240672421.exe File created C:\Windows\SysWOW64\notpad.exe tmp240594796.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240611203.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240640453.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240646328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240667031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240667718.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240685203.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240595062.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240607703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240644093.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240555796.exe File created C:\Windows\SysWOW64\notpad.exe tmp240559171.exe File created C:\Windows\SysWOW64\notpad.exe tmp240674375.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240683203.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240555140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240662937.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240674609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240678796.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240578953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240592187.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240610812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240665968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240667296.exe File created C:\Windows\SysWOW64\notpad.exe tmp240670078.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240675687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240683000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240683390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240666640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240672890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240611203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240681296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240681578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" 0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240610812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240670468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240672640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240673109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240672421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240673968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240678812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240681890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240684046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240669500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240683546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240682546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240599468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240666453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240669734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240684671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240680250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240561250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240666796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240667906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560578.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4968 2972 0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe 80 PID 2972 wrote to memory of 4968 2972 0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe 80 PID 2972 wrote to memory of 4968 2972 0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe 80 PID 4968 wrote to memory of 5072 4968 notpad.exe 81 PID 4968 wrote to memory of 5072 4968 notpad.exe 81 PID 4968 wrote to memory of 5072 4968 notpad.exe 81 PID 4968 wrote to memory of 4432 4968 notpad.exe 82 PID 4968 wrote to memory of 4432 4968 notpad.exe 82 PID 4968 wrote to memory of 4432 4968 notpad.exe 82 PID 5072 wrote to memory of 1408 5072 tmp240555140.exe 83 PID 5072 wrote to memory of 1408 5072 tmp240555140.exe 83 PID 5072 wrote to memory of 1408 5072 tmp240555140.exe 83 PID 1408 wrote to memory of 3392 1408 notpad.exe 84 PID 1408 wrote to memory of 3392 1408 notpad.exe 84 PID 1408 wrote to memory of 3392 1408 notpad.exe 84 PID 1408 wrote to memory of 4512 1408 notpad.exe 85 PID 1408 wrote to memory of 4512 1408 notpad.exe 85 PID 1408 wrote to memory of 4512 1408 notpad.exe 85 PID 3392 wrote to memory of 1580 3392 tmp240555453.exe 86 PID 3392 wrote to memory of 1580 3392 tmp240555453.exe 86 PID 3392 wrote to memory of 1580 3392 tmp240555453.exe 86 PID 1580 wrote to memory of 4880 1580 notpad.exe 87 PID 1580 wrote to memory of 4880 1580 notpad.exe 87 PID 1580 wrote to memory of 4880 1580 notpad.exe 87 PID 1580 wrote to memory of 4796 1580 notpad.exe 88 PID 1580 wrote to memory of 4796 1580 notpad.exe 88 PID 1580 wrote to memory of 4796 1580 notpad.exe 88 PID 4880 wrote to memory of 4724 4880 tmp240555796.exe 89 PID 4880 wrote to memory of 4724 4880 tmp240555796.exe 89 PID 4880 wrote to memory of 4724 4880 tmp240555796.exe 89 PID 4724 wrote to memory of 2252 4724 notpad.exe 90 PID 4724 wrote to memory of 2252 4724 notpad.exe 90 PID 4724 wrote to memory of 2252 4724 notpad.exe 90 PID 4724 wrote to memory of 3268 4724 notpad.exe 91 PID 4724 wrote to memory of 3268 4724 notpad.exe 91 PID 4724 wrote to memory of 3268 4724 notpad.exe 91 PID 2252 wrote to memory of 4368 2252 tmp240556203.exe 92 PID 2252 wrote to memory of 4368 2252 tmp240556203.exe 92 PID 2252 wrote to memory of 4368 2252 tmp240556203.exe 92 PID 4368 wrote to memory of 1240 4368 notpad.exe 93 PID 4368 wrote to memory of 1240 4368 notpad.exe 93 PID 4368 wrote to memory of 1240 4368 notpad.exe 93 PID 4368 wrote to memory of 2632 4368 notpad.exe 94 PID 4368 wrote to memory of 2632 4368 notpad.exe 94 PID 4368 wrote to memory of 2632 4368 notpad.exe 94 PID 1240 wrote to memory of 3080 1240 tmp240556515.exe 95 PID 1240 wrote to memory of 3080 1240 tmp240556515.exe 95 PID 1240 wrote to memory of 3080 1240 tmp240556515.exe 95 PID 3080 wrote to memory of 4396 3080 notpad.exe 96 PID 3080 wrote to memory of 4396 3080 notpad.exe 96 PID 3080 wrote to memory of 4396 3080 notpad.exe 96 PID 3080 wrote to memory of 3052 3080 notpad.exe 97 PID 3080 wrote to memory of 3052 3080 notpad.exe 97 PID 3080 wrote to memory of 3052 3080 notpad.exe 97 PID 4396 wrote to memory of 1316 4396 tmp240556781.exe 98 PID 4396 wrote to memory of 1316 4396 tmp240556781.exe 98 PID 4396 wrote to memory of 1316 4396 tmp240556781.exe 98 PID 1316 wrote to memory of 176 1316 notpad.exe 99 PID 1316 wrote to memory of 176 1316 notpad.exe 99 PID 1316 wrote to memory of 176 1316 notpad.exe 99 PID 1316 wrote to memory of 2016 1316 notpad.exe 100 PID 1316 wrote to memory of 2016 1316 notpad.exe 100 PID 1316 wrote to memory of 2016 1316 notpad.exe 100 PID 176 wrote to memory of 4228 176 tmp240557140.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe"C:\Users\Admin\AppData\Local\Temp\0246e497293ced9cae1cfd6809a7d4e6a9d9980d365e3c6769c60e00c4f0a110.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\tmp240555140.exeC:\Users\Admin\AppData\Local\Temp\tmp240555140.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\tmp240555453.exeC:\Users\Admin\AppData\Local\Temp\tmp240555453.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\tmp240555796.exeC:\Users\Admin\AppData\Local\Temp\tmp240555796.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\tmp240556203.exeC:\Users\Admin\AppData\Local\Temp\tmp240556203.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\tmp240556515.exeC:\Users\Admin\AppData\Local\Temp\tmp240556515.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\tmp240556781.exeC:\Users\Admin\AppData\Local\Temp\tmp240556781.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\tmp240557140.exeC:\Users\Admin\AppData\Local\Temp\tmp240557140.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\tmp240557671.exeC:\Users\Admin\AppData\Local\Temp\tmp240557671.exe17⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:3476 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\tmp240558015.exeC:\Users\Admin\AppData\Local\Temp\tmp240558015.exe19⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\tmp240558328.exeC:\Users\Admin\AppData\Local\Temp\tmp240558328.exe21⤵
- Executes dropped EXE
- Modifies registry class
PID:3356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\Temp\tmp240558640.exeC:\Users\Admin\AppData\Local\Temp\tmp240558640.exe23⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\tmp240558968.exeC:\Users\Admin\AppData\Local\Temp\tmp240558968.exe25⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\tmp240559171.exeC:\Users\Admin\AppData\Local\Temp\tmp240559171.exe27⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:3640 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵
- Executes dropped EXE
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\tmp240559796.exeC:\Users\Admin\AppData\Local\Temp\tmp240559796.exe29⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\tmp240560093.exeC:\Users\Admin\AppData\Local\Temp\tmp240560093.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\tmp240560359.exeC:\Users\Admin\AppData\Local\Temp\tmp240560359.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵
- Executes dropped EXE
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\tmp240560578.exeC:\Users\Admin\AppData\Local\Temp\tmp240560578.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3472 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\tmp240560843.exeC:\Users\Admin\AppData\Local\Temp\tmp240560843.exe37⤵
- Executes dropped EXE
- Checks computer location settings
PID:4204 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵
- Executes dropped EXE
PID:460 -
C:\Users\Admin\AppData\Local\Temp\tmp240561046.exeC:\Users\Admin\AppData\Local\Temp\tmp240561046.exe39⤵
- Executes dropped EXE
- Checks computer location settings
PID:3284 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"40⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\tmp240561250.exeC:\Users\Admin\AppData\Local\Temp\tmp240561250.exe41⤵
- Executes dropped EXE
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\tmp240576031.exeC:\Users\Admin\AppData\Local\Temp\tmp240576031.exe43⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\tmp240577937.exeC:\Users\Admin\AppData\Local\Temp\tmp240577937.exe45⤵
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\tmp240578156.exeC:\Users\Admin\AppData\Local\Temp\tmp240578156.exe47⤵
- Checks computer location settings
PID:4796 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"48⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\tmp240578734.exeC:\Users\Admin\AppData\Local\Temp\tmp240578734.exe49⤵PID:1860
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"50⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\tmp240578953.exeC:\Users\Admin\AppData\Local\Temp\tmp240578953.exe51⤵
- Drops file in System32 directory
- Modifies registry class
PID:4444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\tmp240579171.exeC:\Users\Admin\AppData\Local\Temp\tmp240579171.exe53⤵PID:1376
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\tmp240579875.exeC:\Users\Admin\AppData\Local\Temp\tmp240579875.exe55⤵
- Checks computer location settings
PID:3080 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\tmp240580046.exeC:\Users\Admin\AppData\Local\Temp\tmp240580046.exe57⤵PID:3560
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240580015.exeC:\Users\Admin\AppData\Local\Temp\tmp240580015.exe57⤵
- Modifies registry class
PID:4468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\tmp240580171.exeC:\Users\Admin\AppData\Local\Temp\tmp240580171.exe59⤵PID:3692
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"60⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\tmp240580921.exeC:\Users\Admin\AppData\Local\Temp\tmp240580921.exe61⤵
- Modifies registry class
PID:4492 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\tmp240591234.exeC:\Users\Admin\AppData\Local\Temp\tmp240591234.exe63⤵PID:2388
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\tmp240591453.exeC:\Users\Admin\AppData\Local\Temp\tmp240591453.exe65⤵PID:5112
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\tmp240591953.exeC:\Users\Admin\AppData\Local\Temp\tmp240591953.exe67⤵
- Modifies registry class
PID:5104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\tmp240592187.exeC:\Users\Admin\AppData\Local\Temp\tmp240592187.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:2552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\tmp240592406.exeC:\Users\Admin\AppData\Local\Temp\tmp240592406.exe71⤵
- Checks computer location settings
PID:3820 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\tmp240594796.exeC:\Users\Admin\AppData\Local\Temp\tmp240594796.exe73⤵
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\tmp240595062.exeC:\Users\Admin\AppData\Local\Temp\tmp240595062.exe75⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\tmp240595437.exeC:\Users\Admin\AppData\Local\Temp\tmp240595437.exe77⤵
- Checks computer location settings
PID:1404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\tmp240595687.exeC:\Users\Admin\AppData\Local\Temp\tmp240595687.exe79⤵
- Modifies registry class
PID:4200 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\tmp240595953.exeC:\Users\Admin\AppData\Local\Temp\tmp240595953.exe81⤵
- Checks computer location settings
- Drops file in System32 directory
PID:728 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\tmp240596140.exeC:\Users\Admin\AppData\Local\Temp\tmp240596140.exe83⤵
- Drops file in System32 directory
PID:460 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\tmp240596484.exeC:\Users\Admin\AppData\Local\Temp\tmp240596484.exe85⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3696 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\tmp240596687.exeC:\Users\Admin\AppData\Local\Temp\tmp240596687.exe87⤵PID:4928
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\tmp240596953.exeC:\Users\Admin\AppData\Local\Temp\tmp240596953.exe89⤵
- Modifies registry class
PID:404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\tmp240597265.exeC:\Users\Admin\AppData\Local\Temp\tmp240597265.exe91⤵
- Checks computer location settings
- Modifies registry class
PID:3784 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"92⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\tmp240597531.exeC:\Users\Admin\AppData\Local\Temp\tmp240597531.exe93⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4720 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"94⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\tmp240597796.exeC:\Users\Admin\AppData\Local\Temp\tmp240597796.exe95⤵PID:2308
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\tmp240598015.exeC:\Users\Admin\AppData\Local\Temp\tmp240598015.exe97⤵
- Drops file in System32 directory
- Modifies registry class
PID:1424 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\tmp240598312.exeC:\Users\Admin\AppData\Local\Temp\tmp240598312.exe99⤵PID:32
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\tmp240598625.exeC:\Users\Admin\AppData\Local\Temp\tmp240598625.exe101⤵
- Checks computer location settings
- Modifies registry class
PID:2536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\tmp240598921.exeC:\Users\Admin\AppData\Local\Temp\tmp240598921.exe103⤵
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\tmp240599218.exeC:\Users\Admin\AppData\Local\Temp\tmp240599218.exe105⤵PID:3940
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"106⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\tmp240599468.exeC:\Users\Admin\AppData\Local\Temp\tmp240599468.exe107⤵
- Drops file in System32 directory
- Modifies registry class
PID:5088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\tmp240599781.exeC:\Users\Admin\AppData\Local\Temp\tmp240599781.exe109⤵PID:1000
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"110⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\tmp240600062.exeC:\Users\Admin\AppData\Local\Temp\tmp240600062.exe111⤵
- Checks computer location settings
PID:5012 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\tmp240600328.exeC:\Users\Admin\AppData\Local\Temp\tmp240600328.exe113⤵
- Modifies registry class
PID:4472 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"114⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\tmp240600593.exeC:\Users\Admin\AppData\Local\Temp\tmp240600593.exe115⤵PID:388
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\tmp240600921.exeC:\Users\Admin\AppData\Local\Temp\tmp240600921.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:3552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\tmp240601296.exeC:\Users\Admin\AppData\Local\Temp\tmp240601296.exe119⤵
- Checks computer location settings
PID:2464 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"120⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\tmp240601609.exeC:\Users\Admin\AppData\Local\Temp\tmp240601609.exe121⤵
- Checks computer location settings
PID:2248 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"122⤵PID:628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-