Analysis
-
max time kernel
151s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:12
Behavioral task
behavioral1
Sample
3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe
Resource
win10v2004-20220812-en
General
-
Target
3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe
-
Size
523KB
-
MD5
44a057e92c790091dbbe2396fed978c0
-
SHA1
9a125184fd7ab741a8a45a2381cdf010c8fa1d8f
-
SHA256
3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c
-
SHA512
41395310a55c5ada19d4dbbacb46922d8cbf3e265b579a8de6bb9ef35b1ced1ba121d1a02008078d23be60a0d20d01bbd52ce5359791f1a722443ccd8b98dec3
-
SSDEEP
12288:HP5R9PfPhR9PBPhR9P5x5GpX/8SDyo1tj:xRbR9Rd5GJ/NDyo1tj
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
tmp240562078.exetmp240562203.exenotpad.exetmp240563781.exetmp240563843.exenotpad.exetmp240564468.exetmp240564515.exenotpad.exetmp240564812.exetmp240564859.exenotpad.exetmp240565109.exetmp240565171.exenotpad.exetmp240565406.exetmp240565484.exenotpad.exetmp240565671.exetmp240565703.exenotpad.exetmp240566171.exetmp240566265.exenotpad.exetmp240566656.exetmp240566687.exenotpad.exetmp240567062.exetmp240567140.exenotpad.exetmp240567437.exetmp240567640.exenotpad.exetmp240567921.exetmp240567953.exenotpad.exetmp240568140.exetmp240568171.exenotpad.exetmp240568375.exetmp240568437.exenotpad.exetmp240568703.exetmp240568781.exenotpad.exetmp240569000.exetmp240569031.exenotpad.exetmp240569250.exetmp240569296.exenotpad.exetmp240569531.exetmp240569578.exenotpad.exetmp240569765.exenotpad.exetmp240569812.exetmp240570015.exenotpad.exetmp240589140.exetmp240588921.exetmp240589937.exenotpad.exetmp240590078.exepid process 1376 tmp240562078.exe 1132 tmp240562203.exe 4928 notpad.exe 2536 tmp240563781.exe 4040 tmp240563843.exe 1044 notpad.exe 5036 tmp240564468.exe 2892 tmp240564515.exe 4116 notpad.exe 4540 tmp240564812.exe 4404 tmp240564859.exe 4244 notpad.exe 2492 tmp240565109.exe 2292 tmp240565171.exe 3128 notpad.exe 4624 tmp240565406.exe 1484 tmp240565484.exe 1988 notpad.exe 3860 tmp240565671.exe 1888 tmp240565703.exe 3528 notpad.exe 5056 tmp240566171.exe 2168 tmp240566265.exe 432 notpad.exe 1592 tmp240566656.exe 4692 tmp240566687.exe 3024 notpad.exe 3080 tmp240567062.exe 4912 tmp240567140.exe 4296 notpad.exe 4564 tmp240567437.exe 4876 tmp240567640.exe 764 notpad.exe 5092 tmp240567921.exe 3148 tmp240567953.exe 3496 notpad.exe 2040 tmp240568140.exe 4280 tmp240568171.exe 5008 notpad.exe 4868 tmp240568375.exe 4324 tmp240568437.exe 508 notpad.exe 4932 tmp240568703.exe 2312 tmp240568781.exe 4000 notpad.exe 3464 tmp240569000.exe 3396 tmp240569031.exe 4148 notpad.exe 1308 tmp240569250.exe 4304 tmp240569296.exe 3292 notpad.exe 4844 tmp240569531.exe 2036 tmp240569578.exe 2564 notpad.exe 4848 tmp240569765.exe 4028 notpad.exe 3900 tmp240569812.exe 4264 tmp240570015.exe 3352 notpad.exe 260 tmp240589140.exe 2324 tmp240588921.exe 4284 tmp240589937.exe 2892 notpad.exe 1420 tmp240590078.exe -
Processes:
resource yara_rule behavioral2/memory/2252-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2252-139-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx behavioral2/memory/4928-143-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/4928-151-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/1044-161-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx behavioral2/memory/4116-164-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4116-172-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\fsb.stb upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/4244-182-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/3128-192-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/1988-201-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1988-203-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/3528-213-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/432-223-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\notpad.exe upx behavioral2/memory/3024-233-0x0000000000400000-0x000000000041F000-memory.dmp upx C:\Windows\SysWOW64\fsb.stb upx C:\Windows\SysWOW64\notpad.exe upx C:\Windows\SysWOW64\fsb.stb upx behavioral2/memory/4296-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/764-246-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3496-250-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5008-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/508-258-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4000-262-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4148-266-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3292-270-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2564-273-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4028-275-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2564-278-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3352-280-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3352-285-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4028-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2892-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4208-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4208-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3504-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3504-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/912-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4960-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/364-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/364-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4804-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1336-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4336-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4336-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4336-301-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2224-302-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp240618500.exetmp240667062.exetmp240686218.exetmp240614953.exetmp240658593.exetmp240662687.exetmp240663765.exetmp240684078.exetmp240685203.exetmp240616046.exetmp240564812.exetmp240608328.exetmp240647390.exetmp240659609.exetmp240667781.exetmp240564468.exetmp240656125.exetmp240608906.exetmp240641156.exetmp240685078.exetmp240707359.exetmp240607750.exetmp240614765.exetmp240652312.exetmp240655078.exetmp240669953.exetmp240613015.exetmp240611843.exetmp240613750.exetmp240659812.exetmp240660625.exetmp240665484.exetmp240607031.exetmp240668062.exetmp240668890.exetmp240708281.exetmp240664609.exetmp240654093.exetmp240660812.exetmp240565671.exetmp240605000.exetmp240617984.exetmp240662140.exetmp240684343.exetmp240707671.exetmp240589140.exetmp240666484.exetmp240565406.exetmp240610031.exetmp240665890.exetmp240606734.exetmp240654250.exetmp240658906.exetmp240666671.exetmp240567062.exetmp240618109.exetmp240655812.exetmp240656468.exetmp240657968.exetmp240664390.exetmp240616250.exetmp240609265.exetmp240611234.exetmp240613218.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240618500.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240667062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240686218.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240614953.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240658593.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240662687.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240663765.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240684078.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240685203.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240616046.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240564812.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240608328.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240647390.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240659609.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240667781.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240564468.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240656125.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240608906.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240641156.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240685078.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240707359.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240607750.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240614765.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240652312.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240655078.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240669953.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240613015.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240611843.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240613750.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240659812.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240660625.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240665484.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240607031.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240668062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240668890.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240708281.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240664609.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240654093.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240660812.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240565671.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240605000.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240617984.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240662140.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240684343.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240707671.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240589140.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240666484.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240565406.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240610031.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240665890.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240606734.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240654250.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240658906.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240666671.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240567062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240618109.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240655812.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240656468.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240657968.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240664390.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240616250.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240609265.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240611234.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240613218.exe -
Drops file in System32 directory 64 IoCs
Processes:
tmp240607390.exetmp240615875.exetmp240652312.exetmp240660421.exetmp240664390.exetmp240566656.exetmp240568375.exetmp240658593.exetmp240659609.exetmp240669546.exetmp240590078.exetmp240608687.exetmp240617312.exetmp240658343.exetmp240565406.exetmp240613750.exetmp240655265.exetmp240669953.exetmp240614531.exetmp240613015.exetmp240615312.exetmp240593984.exetmp240608328.exetmp240664609.exetmp240662968.exetmp240663765.exetmp240665484.exetmp240669890.exetmp240684609.exetmp240606734.exetmp240659812.exetmp240609640.exetmp240661406.exetmp240565671.exetmp240605718.exetmp240660234.exetmp240685703.exetmp240569531.exetmp240658906.exetmp240590281.exetmp240647390.exetmp240665125.exetmp240667062.exetmp240668687.exetmp240616046.exetmp240668421.exetmp240659390.exetmp240667781.exetmp240684078.exetmp240593765.exetmp240607031.exedescription ioc process File created C:\Windows\SysWOW64\notpad.exe- tmp240607390.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240615875.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240652312.exe File created C:\Windows\SysWOW64\notpad.exe tmp240660421.exe File created C:\Windows\SysWOW64\notpad.exe tmp240664390.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240566656.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240568375.exe File created C:\Windows\SysWOW64\notpad.exe tmp240658593.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240659609.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240669546.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590078.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240608687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240617312.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240658343.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240565406.exe File created C:\Windows\SysWOW64\notpad.exe tmp240613750.exe File created C:\Windows\SysWOW64\notpad.exe tmp240655265.exe File created C:\Windows\SysWOW64\notpad.exe tmp240658343.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240669953.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240614531.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240614531.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240613015.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240615312.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240593984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240608328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240659609.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240664609.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240662968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240663765.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240665484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240669890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240684609.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240606734.exe File created C:\Windows\SysWOW64\notpad.exe tmp240659812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240609640.exe File created C:\Windows\SysWOW64\notpad.exe tmp240661406.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240565671.exe File created C:\Windows\SysWOW64\notpad.exe tmp240605718.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240565671.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240660234.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240662968.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240685703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240569531.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240658906.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240590281.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240647390.exe File created C:\Windows\SysWOW64\notpad.exe tmp240665125.exe File created C:\Windows\SysWOW64\notpad.exe tmp240665484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240667062.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240668687.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240605718.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240616046.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240668421.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240608328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240664390.exe File created C:\Windows\SysWOW64\notpad.exe tmp240659390.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240669890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240659609.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240659609.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240667781.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240667781.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240684078.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240593765.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240607031.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
tmp240668421.exetmp240606531.exetmp240606734.exetmp240610031.exetmp240611234.exetmp240615875.exetmp240665484.exetmp240570015.exetmp240617312.exetmp240656718.exetmp240708281.exetmp240589140.exetmp240605718.exetmp240607750.exetmp240608906.exetmp240614140.exetmp240659812.exetmp240590531.exetmp240592281.exetmp240608109.exetmp240657968.exetmp240664390.exetmp240665125.exetmp240590281.exetmp240616453.exetmp240660625.exetmp240661406.exetmp240666671.exetmp240613015.exetmp240652953.exetmp240659390.exetmp240663765.exetmp240707359.exetmp240565671.exetmp240667531.exetmp240683515.exetmp240684343.exetmp240665890.exetmp240686468.exetmp240605000.exetmp240608328.exetmp240612109.exetmp240616250.exetmp240663546.exetmp240667484.exetmp240593984.exetmp240616046.exetmp240617984.exetmp240668062.exetmp240669546.exetmp240564812.exetmp240569531.exetmp240590078.exetmp240659609.exetmp240668890.exetmp240684078.exetmp240567437.exetmp240568703.exetmp240569765.exetmp240611531.exetmp240667781.exetmp240685500.exetmp240616671.exetmp240618109.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240668421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240610031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240611234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240615875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240656718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240708281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240607750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240608906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240659812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240608109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240657968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240664390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240660625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240661406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240666671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240613015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240652953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240659390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240663765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240707359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240565671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240667531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240683515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240684343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240686468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240608328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240663546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240667484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240668062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240669546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240564812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240569531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240659609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240668890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240684078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240567437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240568703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240569765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240611531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240667781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240685500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240618109.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exetmp240562078.exenotpad.exetmp240563781.exenotpad.exetmp240564468.exenotpad.exetmp240564812.exenotpad.exetmp240565109.exenotpad.exetmp240565406.exenotpad.exetmp240565671.exenotpad.exedescription pid process target process PID 2252 wrote to memory of 1376 2252 3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe tmp240562078.exe PID 2252 wrote to memory of 1376 2252 3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe tmp240562078.exe PID 2252 wrote to memory of 1376 2252 3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe tmp240562078.exe PID 2252 wrote to memory of 1132 2252 3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe tmp240562203.exe PID 2252 wrote to memory of 1132 2252 3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe tmp240562203.exe PID 2252 wrote to memory of 1132 2252 3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe tmp240562203.exe PID 1376 wrote to memory of 4928 1376 tmp240562078.exe notpad.exe PID 1376 wrote to memory of 4928 1376 tmp240562078.exe notpad.exe PID 1376 wrote to memory of 4928 1376 tmp240562078.exe notpad.exe PID 4928 wrote to memory of 2536 4928 notpad.exe tmp240563781.exe PID 4928 wrote to memory of 2536 4928 notpad.exe tmp240563781.exe PID 4928 wrote to memory of 2536 4928 notpad.exe tmp240563781.exe PID 4928 wrote to memory of 4040 4928 notpad.exe tmp240563843.exe PID 4928 wrote to memory of 4040 4928 notpad.exe tmp240563843.exe PID 4928 wrote to memory of 4040 4928 notpad.exe tmp240563843.exe PID 2536 wrote to memory of 1044 2536 tmp240563781.exe notpad.exe PID 2536 wrote to memory of 1044 2536 tmp240563781.exe notpad.exe PID 2536 wrote to memory of 1044 2536 tmp240563781.exe notpad.exe PID 1044 wrote to memory of 5036 1044 notpad.exe tmp240564468.exe PID 1044 wrote to memory of 5036 1044 notpad.exe tmp240564468.exe PID 1044 wrote to memory of 5036 1044 notpad.exe tmp240564468.exe PID 1044 wrote to memory of 2892 1044 notpad.exe tmp240564515.exe PID 1044 wrote to memory of 2892 1044 notpad.exe tmp240564515.exe PID 1044 wrote to memory of 2892 1044 notpad.exe tmp240564515.exe PID 5036 wrote to memory of 4116 5036 tmp240564468.exe notpad.exe PID 5036 wrote to memory of 4116 5036 tmp240564468.exe notpad.exe PID 5036 wrote to memory of 4116 5036 tmp240564468.exe notpad.exe PID 4116 wrote to memory of 4540 4116 notpad.exe tmp240564812.exe PID 4116 wrote to memory of 4540 4116 notpad.exe tmp240564812.exe PID 4116 wrote to memory of 4540 4116 notpad.exe tmp240564812.exe PID 4116 wrote to memory of 4404 4116 notpad.exe tmp240564859.exe PID 4116 wrote to memory of 4404 4116 notpad.exe tmp240564859.exe PID 4116 wrote to memory of 4404 4116 notpad.exe tmp240564859.exe PID 4540 wrote to memory of 4244 4540 tmp240564812.exe notpad.exe PID 4540 wrote to memory of 4244 4540 tmp240564812.exe notpad.exe PID 4540 wrote to memory of 4244 4540 tmp240564812.exe notpad.exe PID 4244 wrote to memory of 2492 4244 notpad.exe tmp240565109.exe PID 4244 wrote to memory of 2492 4244 notpad.exe tmp240565109.exe PID 4244 wrote to memory of 2492 4244 notpad.exe tmp240565109.exe PID 4244 wrote to memory of 2292 4244 notpad.exe tmp240565171.exe PID 4244 wrote to memory of 2292 4244 notpad.exe tmp240565171.exe PID 4244 wrote to memory of 2292 4244 notpad.exe tmp240565171.exe PID 2492 wrote to memory of 3128 2492 tmp240565109.exe notpad.exe PID 2492 wrote to memory of 3128 2492 tmp240565109.exe notpad.exe PID 2492 wrote to memory of 3128 2492 tmp240565109.exe notpad.exe PID 3128 wrote to memory of 4624 3128 notpad.exe tmp240565406.exe PID 3128 wrote to memory of 4624 3128 notpad.exe tmp240565406.exe PID 3128 wrote to memory of 4624 3128 notpad.exe tmp240565406.exe PID 3128 wrote to memory of 1484 3128 notpad.exe tmp240565484.exe PID 3128 wrote to memory of 1484 3128 notpad.exe tmp240565484.exe PID 3128 wrote to memory of 1484 3128 notpad.exe tmp240565484.exe PID 4624 wrote to memory of 1988 4624 tmp240565406.exe notpad.exe PID 4624 wrote to memory of 1988 4624 tmp240565406.exe notpad.exe PID 4624 wrote to memory of 1988 4624 tmp240565406.exe notpad.exe PID 1988 wrote to memory of 3860 1988 notpad.exe tmp240565671.exe PID 1988 wrote to memory of 3860 1988 notpad.exe tmp240565671.exe PID 1988 wrote to memory of 3860 1988 notpad.exe tmp240565671.exe PID 1988 wrote to memory of 1888 1988 notpad.exe tmp240565703.exe PID 1988 wrote to memory of 1888 1988 notpad.exe tmp240565703.exe PID 1988 wrote to memory of 1888 1988 notpad.exe tmp240565703.exe PID 3860 wrote to memory of 3528 3860 tmp240565671.exe notpad.exe PID 3860 wrote to memory of 3528 3860 tmp240565671.exe notpad.exe PID 3860 wrote to memory of 3528 3860 tmp240565671.exe notpad.exe PID 3528 wrote to memory of 5056 3528 notpad.exe tmp240566171.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe"C:\Users\Admin\AppData\Local\Temp\3f65dcd791f2a29eb9b71e5b0e284bff3e97d221764b64d55d72582239acde8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\tmp240562078.exeC:\Users\Admin\AppData\Local\Temp\tmp240562078.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\tmp240563781.exeC:\Users\Admin\AppData\Local\Temp\tmp240563781.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\tmp240564468.exeC:\Users\Admin\AppData\Local\Temp\tmp240564468.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\tmp240564812.exeC:\Users\Admin\AppData\Local\Temp\tmp240564812.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\tmp240565109.exeC:\Users\Admin\AppData\Local\Temp\tmp240565109.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\tmp240565406.exeC:\Users\Admin\AppData\Local\Temp\tmp240565406.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\tmp240565671.exeC:\Users\Admin\AppData\Local\Temp\tmp240565671.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\tmp240566171.exeC:\Users\Admin\AppData\Local\Temp\tmp240566171.exe16⤵
- Executes dropped EXE
PID:5056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:432 -
C:\Users\Admin\AppData\Local\Temp\tmp240566656.exeC:\Users\Admin\AppData\Local\Temp\tmp240566656.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\tmp240567062.exeC:\Users\Admin\AppData\Local\Temp\tmp240567062.exe20⤵
- Executes dropped EXE
- Checks computer location settings
PID:3080 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\tmp240567437.exeC:\Users\Admin\AppData\Local\Temp\tmp240567437.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\tmp240567921.exeC:\Users\Admin\AppData\Local\Temp\tmp240567921.exe24⤵
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\tmp240568140.exeC:\Users\Admin\AppData\Local\Temp\tmp240568140.exe26⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\tmp240568375.exeC:\Users\Admin\AppData\Local\Temp\tmp240568375.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:508 -
C:\Users\Admin\AppData\Local\Temp\tmp240568703.exeC:\Users\Admin\AppData\Local\Temp\tmp240568703.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:4932 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\tmp240569000.exeC:\Users\Admin\AppData\Local\Temp\tmp240569000.exe32⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\tmp240569250.exeC:\Users\Admin\AppData\Local\Temp\tmp240569250.exe34⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\tmp240569531.exeC:\Users\Admin\AppData\Local\Temp\tmp240569531.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\tmp240569765.exeC:\Users\Admin\AppData\Local\Temp\tmp240569765.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:4848 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\tmp240570015.exeC:\Users\Admin\AppData\Local\Temp\tmp240570015.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:4264 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\tmp240589140.exeC:\Users\Admin\AppData\Local\Temp\tmp240589140.exe42⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:260 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\tmp240590078.exeC:\Users\Admin\AppData\Local\Temp\tmp240590078.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1420 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\tmp240590281.exeC:\Users\Admin\AppData\Local\Temp\tmp240590281.exe46⤵
- Drops file in System32 directory
- Modifies registry class
PID:2248 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\tmp240590531.exeC:\Users\Admin\AppData\Local\Temp\tmp240590531.exe48⤵
- Modifies registry class
PID:3256 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\tmp240591765.exeC:\Users\Admin\AppData\Local\Temp\tmp240591765.exe50⤵PID:3128
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\tmp240592000.exeC:\Users\Admin\AppData\Local\Temp\tmp240592000.exe52⤵PID:2796
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\tmp240592281.exeC:\Users\Admin\AppData\Local\Temp\tmp240592281.exe54⤵
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\tmp240593546.exeC:\Users\Admin\AppData\Local\Temp\tmp240593546.exe56⤵PID:2168
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\tmp240593765.exeC:\Users\Admin\AppData\Local\Temp\tmp240593765.exe58⤵
- Drops file in System32 directory
PID:392 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\tmp240593984.exeC:\Users\Admin\AppData\Local\Temp\tmp240593984.exe60⤵
- Drops file in System32 directory
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\tmp240605000.exeC:\Users\Admin\AppData\Local\Temp\tmp240605000.exe62⤵
- Checks computer location settings
- Modifies registry class
PID:4300 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\tmp240605718.exeC:\Users\Admin\AppData\Local\Temp\tmp240605718.exe64⤵
- Drops file in System32 directory
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\tmp240606187.exeC:\Users\Admin\AppData\Local\Temp\tmp240606187.exe66⤵PID:1444
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\tmp240606531.exeC:\Users\Admin\AppData\Local\Temp\tmp240606531.exe68⤵
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\tmp240606734.exeC:\Users\Admin\AppData\Local\Temp\tmp240606734.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2800 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\tmp240607031.exeC:\Users\Admin\AppData\Local\Temp\tmp240607031.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\tmp240607390.exeC:\Users\Admin\AppData\Local\Temp\tmp240607390.exe74⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\tmp240607750.exeC:\Users\Admin\AppData\Local\Temp\tmp240607750.exe76⤵
- Checks computer location settings
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\tmp240608109.exeC:\Users\Admin\AppData\Local\Temp\tmp240608109.exe78⤵
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\tmp240608328.exeC:\Users\Admin\AppData\Local\Temp\tmp240608328.exe80⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3928 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\tmp240608687.exeC:\Users\Admin\AppData\Local\Temp\tmp240608687.exe82⤵
- Drops file in System32 directory
PID:4836 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\tmp240608906.exeC:\Users\Admin\AppData\Local\Temp\tmp240608906.exe84⤵
- Checks computer location settings
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\tmp240609265.exeC:\Users\Admin\AppData\Local\Temp\tmp240609265.exe86⤵
- Checks computer location settings
PID:2536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\tmp240609640.exeC:\Users\Admin\AppData\Local\Temp\tmp240609640.exe88⤵
- Drops file in System32 directory
PID:4404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\tmp240610031.exeC:\Users\Admin\AppData\Local\Temp\tmp240610031.exe90⤵
- Checks computer location settings
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\tmp240611234.exeC:\Users\Admin\AppData\Local\Temp\tmp240611234.exe92⤵
- Checks computer location settings
- Modifies registry class
PID:3256 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\tmp240611531.exeC:\Users\Admin\AppData\Local\Temp\tmp240611531.exe94⤵
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\tmp240611843.exeC:\Users\Admin\AppData\Local\Temp\tmp240611843.exe96⤵
- Checks computer location settings
PID:2784 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\tmp240612109.exeC:\Users\Admin\AppData\Local\Temp\tmp240612109.exe98⤵
- Modifies registry class
PID:5056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\tmp240612359.exeC:\Users\Admin\AppData\Local\Temp\tmp240612359.exe100⤵PID:460
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\tmp240612609.exeC:\Users\Admin\AppData\Local\Temp\tmp240612609.exe102⤵PID:3024
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\tmp240612843.exeC:\Users\Admin\AppData\Local\Temp\tmp240612843.exe104⤵PID:4396
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\tmp240613015.exeC:\Users\Admin\AppData\Local\Temp\tmp240613015.exe106⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\tmp240613218.exeC:\Users\Admin\AppData\Local\Temp\tmp240613218.exe108⤵
- Checks computer location settings
PID:4280 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\tmp240613515.exeC:\Users\Admin\AppData\Local\Temp\tmp240613515.exe110⤵PID:1360
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\tmp240613750.exeC:\Users\Admin\AppData\Local\Temp\tmp240613750.exe112⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\tmp240613937.exeC:\Users\Admin\AppData\Local\Temp\tmp240613937.exe114⤵PID:4088
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\tmp240614140.exeC:\Users\Admin\AppData\Local\Temp\tmp240614140.exe116⤵
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\tmp240614328.exeC:\Users\Admin\AppData\Local\Temp\tmp240614328.exe118⤵PID:4304
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\tmp240614531.exeC:\Users\Admin\AppData\Local\Temp\tmp240614531.exe120⤵
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\tmp240614765.exeC:\Users\Admin\AppData\Local\Temp\tmp240614765.exe122⤵
- Checks computer location settings
PID:4424 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"123⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\tmp240614953.exeC:\Users\Admin\AppData\Local\Temp\tmp240614953.exe124⤵
- Checks computer location settings
PID:4848 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"125⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\tmp240615140.exeC:\Users\Admin\AppData\Local\Temp\tmp240615140.exe126⤵PID:4040
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"127⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\tmp240615312.exeC:\Users\Admin\AppData\Local\Temp\tmp240615312.exe128⤵
- Drops file in System32 directory
PID:3352 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"129⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\tmp240615515.exeC:\Users\Admin\AppData\Local\Temp\tmp240615515.exe130⤵PID:4704
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"131⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\tmp240615687.exeC:\Users\Admin\AppData\Local\Temp\tmp240615687.exe132⤵PID:4348
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"133⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\tmp240615875.exeC:\Users\Admin\AppData\Local\Temp\tmp240615875.exe134⤵
- Drops file in System32 directory
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"135⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\tmp240616046.exeC:\Users\Admin\AppData\Local\Temp\tmp240616046.exe136⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"137⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\tmp240616250.exeC:\Users\Admin\AppData\Local\Temp\tmp240616250.exe138⤵
- Checks computer location settings
- Modifies registry class
PID:4756 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"139⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\tmp240616453.exeC:\Users\Admin\AppData\Local\Temp\tmp240616453.exe140⤵
- Modifies registry class
PID:2560 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"141⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\tmp240616671.exeC:\Users\Admin\AppData\Local\Temp\tmp240616671.exe142⤵
- Modifies registry class
PID:5004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"143⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\tmp240617312.exeC:\Users\Admin\AppData\Local\Temp\tmp240617312.exe144⤵
- Drops file in System32 directory
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"145⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\tmp240617984.exeC:\Users\Admin\AppData\Local\Temp\tmp240617984.exe146⤵
- Checks computer location settings
- Modifies registry class
PID:5060 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"147⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\tmp240618109.exeC:\Users\Admin\AppData\Local\Temp\tmp240618109.exe148⤵
- Checks computer location settings
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"149⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\tmp240618500.exeC:\Users\Admin\AppData\Local\Temp\tmp240618500.exe150⤵
- Checks computer location settings
PID:1176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"151⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\tmp240641156.exeC:\Users\Admin\AppData\Local\Temp\tmp240641156.exe152⤵
- Checks computer location settings
PID:3436 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"153⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\tmp240647390.exeC:\Users\Admin\AppData\Local\Temp\tmp240647390.exe154⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3656 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"155⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\tmp240652171.exeC:\Users\Admin\AppData\Local\Temp\tmp240652171.exe156⤵PID:1876
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"157⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\tmp240652312.exeC:\Users\Admin\AppData\Local\Temp\tmp240652312.exe158⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"159⤵PID:260
-
C:\Users\Admin\AppData\Local\Temp\tmp240652953.exeC:\Users\Admin\AppData\Local\Temp\tmp240652953.exe160⤵
- Modifies registry class
PID:4116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"161⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\tmp240653875.exeC:\Users\Admin\AppData\Local\Temp\tmp240653875.exe162⤵PID:3392
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"163⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\tmp240654093.exeC:\Users\Admin\AppData\Local\Temp\tmp240654093.exe164⤵
- Checks computer location settings
PID:916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"165⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\tmp240654375.exeC:\Users\Admin\AppData\Local\Temp\tmp240654375.exe166⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\tmp240654531.exeC:\Users\Admin\AppData\Local\Temp\tmp240654531.exe166⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\tmp240654640.exeC:\Users\Admin\AppData\Local\Temp\tmp240654640.exe167⤵PID:3324
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"168⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\tmp240655031.exeC:\Users\Admin\AppData\Local\Temp\tmp240655031.exe169⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\tmp240655046.exeC:\Users\Admin\AppData\Local\Temp\tmp240655046.exe169⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\tmp240655078.exeC:\Users\Admin\AppData\Local\Temp\tmp240655078.exe170⤵
- Checks computer location settings
PID:4340 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"171⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\tmp240655265.exeC:\Users\Admin\AppData\Local\Temp\tmp240655265.exe172⤵
- Drops file in System32 directory
PID:3336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"173⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\tmp240655453.exeC:\Users\Admin\AppData\Local\Temp\tmp240655453.exe174⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\tmp240655593.exeC:\Users\Admin\AppData\Local\Temp\tmp240655593.exe174⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\tmp240655656.exeC:\Users\Admin\AppData\Local\Temp\tmp240655656.exe175⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\tmp240655671.exeC:\Users\Admin\AppData\Local\Temp\tmp240655671.exe175⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\tmp240655703.exeC:\Users\Admin\AppData\Local\Temp\tmp240655703.exe176⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\tmp240655734.exeC:\Users\Admin\AppData\Local\Temp\tmp240655734.exe176⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\tmp240655281.exeC:\Users\Admin\AppData\Local\Temp\tmp240655281.exe172⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\tmp240655328.exeC:\Users\Admin\AppData\Local\Temp\tmp240655328.exe173⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\tmp240655359.exeC:\Users\Admin\AppData\Local\Temp\tmp240655359.exe173⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\tmp240655421.exeC:\Users\Admin\AppData\Local\Temp\tmp240655421.exe174⤵PID:5092
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"175⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\tmp240655828.exeC:\Users\Admin\AppData\Local\Temp\tmp240655828.exe176⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\tmp240655843.exeC:\Users\Admin\AppData\Local\Temp\tmp240655843.exe177⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\tmp240655859.exeC:\Users\Admin\AppData\Local\Temp\tmp240655859.exe177⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\tmp240655906.exeC:\Users\Admin\AppData\Local\Temp\tmp240655906.exe178⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\tmp240656062.exeC:\Users\Admin\AppData\Local\Temp\tmp240656062.exe178⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\tmp240655812.exeC:\Users\Admin\AppData\Local\Temp\tmp240655812.exe176⤵
- Checks computer location settings
PID:2444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"177⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\tmp240656125.exeC:\Users\Admin\AppData\Local\Temp\tmp240656125.exe178⤵
- Checks computer location settings
PID:2672 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"179⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\tmp240656500.exeC:\Users\Admin\AppData\Local\Temp\tmp240656500.exe180⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\tmp240656531.exeC:\Users\Admin\AppData\Local\Temp\tmp240656531.exe180⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\tmp240656593.exeC:\Users\Admin\AppData\Local\Temp\tmp240656593.exe181⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\tmp240656640.exeC:\Users\Admin\AppData\Local\Temp\tmp240656640.exe181⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\tmp240656703.exeC:\Users\Admin\AppData\Local\Temp\tmp240656703.exe182⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\tmp240656734.exeC:\Users\Admin\AppData\Local\Temp\tmp240656734.exe182⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\tmp240656250.exeC:\Users\Admin\AppData\Local\Temp\tmp240656250.exe178⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\tmp240656343.exeC:\Users\Admin\AppData\Local\Temp\tmp240656343.exe179⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\tmp240656406.exeC:\Users\Admin\AppData\Local\Temp\tmp240656406.exe179⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\tmp240656468.exeC:\Users\Admin\AppData\Local\Temp\tmp240656468.exe180⤵
- Checks computer location settings
PID:1604 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"181⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\tmp240656718.exeC:\Users\Admin\AppData\Local\Temp\tmp240656718.exe182⤵
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"183⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\tmp240657109.exeC:\Users\Admin\AppData\Local\Temp\tmp240657109.exe184⤵PID:2564
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"185⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\tmp240657359.exeC:\Users\Admin\AppData\Local\Temp\tmp240657359.exe186⤵PID:320
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"187⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\tmp240657640.exeC:\Users\Admin\AppData\Local\Temp\tmp240657640.exe188⤵PID:932
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"189⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\tmp240657968.exeC:\Users\Admin\AppData\Local\Temp\tmp240657968.exe190⤵
- Checks computer location settings
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"191⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\tmp240658343.exeC:\Users\Admin\AppData\Local\Temp\tmp240658343.exe192⤵
- Drops file in System32 directory
PID:4664 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"193⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\tmp240658593.exeC:\Users\Admin\AppData\Local\Temp\tmp240658593.exe194⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"195⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\tmp240658906.exeC:\Users\Admin\AppData\Local\Temp\tmp240658906.exe196⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4400 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"197⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\tmp240659171.exeC:\Users\Admin\AppData\Local\Temp\tmp240659171.exe198⤵PID:4280
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"199⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\tmp240659390.exeC:\Users\Admin\AppData\Local\Temp\tmp240659390.exe200⤵
- Drops file in System32 directory
- Modifies registry class
PID:3932 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"201⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\tmp240659609.exeC:\Users\Admin\AppData\Local\Temp\tmp240659609.exe202⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"203⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\tmp240659812.exeC:\Users\Admin\AppData\Local\Temp\tmp240659812.exe204⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:668 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"205⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\tmp240660234.exeC:\Users\Admin\AppData\Local\Temp\tmp240660234.exe206⤵
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"207⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\tmp240660421.exeC:\Users\Admin\AppData\Local\Temp\tmp240660421.exe208⤵
- Drops file in System32 directory
PID:372 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"209⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\tmp240660625.exeC:\Users\Admin\AppData\Local\Temp\tmp240660625.exe210⤵
- Checks computer location settings
- Modifies registry class
PID:1524 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"211⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\tmp240660812.exeC:\Users\Admin\AppData\Local\Temp\tmp240660812.exe212⤵
- Checks computer location settings
PID:1432 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"213⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\tmp240661046.exeC:\Users\Admin\AppData\Local\Temp\tmp240661046.exe214⤵PID:2068
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"215⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\tmp240661406.exeC:\Users\Admin\AppData\Local\Temp\tmp240661406.exe216⤵
- Drops file in System32 directory
- Modifies registry class
PID:4780 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"217⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\tmp240662140.exeC:\Users\Admin\AppData\Local\Temp\tmp240662140.exe218⤵
- Checks computer location settings
PID:1612 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"219⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\tmp240662406.exeC:\Users\Admin\AppData\Local\Temp\tmp240662406.exe220⤵PID:4648
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"221⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\tmp240662687.exeC:\Users\Admin\AppData\Local\Temp\tmp240662687.exe222⤵
- Checks computer location settings
PID:4900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"223⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\tmp240662968.exeC:\Users\Admin\AppData\Local\Temp\tmp240662968.exe224⤵
- Drops file in System32 directory
PID:3652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"225⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\tmp240663375.exeC:\Users\Admin\AppData\Local\Temp\tmp240663375.exe226⤵PID:4160
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"227⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\tmp240663562.exeC:\Users\Admin\AppData\Local\Temp\tmp240663562.exe228⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\tmp240663578.exeC:\Users\Admin\AppData\Local\Temp\tmp240663578.exe228⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\tmp240663640.exeC:\Users\Admin\AppData\Local\Temp\tmp240663640.exe229⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\tmp240663656.exeC:\Users\Admin\AppData\Local\Temp\tmp240663656.exe229⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\tmp240663703.exeC:\Users\Admin\AppData\Local\Temp\tmp240663703.exe230⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\tmp240663718.exeC:\Users\Admin\AppData\Local\Temp\tmp240663718.exe230⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\tmp240663750.exeC:\Users\Admin\AppData\Local\Temp\tmp240663750.exe231⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\tmp240663828.exeC:\Users\Admin\AppData\Local\Temp\tmp240663828.exe231⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\tmp240663390.exeC:\Users\Admin\AppData\Local\Temp\tmp240663390.exe226⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\tmp240663421.exeC:\Users\Admin\AppData\Local\Temp\tmp240663421.exe227⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\tmp240663437.exeC:\Users\Admin\AppData\Local\Temp\tmp240663437.exe227⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\tmp240663500.exeC:\Users\Admin\AppData\Local\Temp\tmp240663500.exe228⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\tmp240663515.exeC:\Users\Admin\AppData\Local\Temp\tmp240663515.exe228⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\tmp240663546.exeC:\Users\Admin\AppData\Local\Temp\tmp240663546.exe229⤵
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"230⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\tmp240663765.exeC:\Users\Admin\AppData\Local\Temp\tmp240663765.exe231⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5020 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"232⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\tmp240663984.exeC:\Users\Admin\AppData\Local\Temp\tmp240663984.exe233⤵PID:4680
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"234⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\tmp240664187.exeC:\Users\Admin\AppData\Local\Temp\tmp240664187.exe235⤵PID:4496
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"236⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\tmp240664406.exeC:\Users\Admin\AppData\Local\Temp\tmp240664406.exe237⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\tmp240664421.exeC:\Users\Admin\AppData\Local\Temp\tmp240664421.exe237⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\tmp240664515.exeC:\Users\Admin\AppData\Local\Temp\tmp240664515.exe238⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\tmp240664546.exeC:\Users\Admin\AppData\Local\Temp\tmp240664546.exe238⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\tmp240664578.exeC:\Users\Admin\AppData\Local\Temp\tmp240664578.exe239⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\tmp240664593.exeC:\Users\Admin\AppData\Local\Temp\tmp240664593.exe239⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\tmp240664671.exeC:\Users\Admin\AppData\Local\Temp\tmp240664671.exe240⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\tmp240664781.exeC:\Users\Admin\AppData\Local\Temp\tmp240664781.exe240⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\tmp240664203.exeC:\Users\Admin\AppData\Local\Temp\tmp240664203.exe235⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\tmp240664296.exeC:\Users\Admin\AppData\Local\Temp\tmp240664296.exe236⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\tmp240664312.exeC:\Users\Admin\AppData\Local\Temp\tmp240664312.exe236⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\tmp240664390.exeC:\Users\Admin\AppData\Local\Temp\tmp240664390.exe237⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"238⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\tmp240664609.exeC:\Users\Admin\AppData\Local\Temp\tmp240664609.exe239⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4228 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"240⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\tmp240664937.exeC:\Users\Admin\AppData\Local\Temp\tmp240664937.exe241⤵PID:828
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"242⤵PID:5060