Analysis
-
max time kernel
91s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 01:16
Behavioral task
behavioral1
Sample
c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe
Resource
win10v2004-20220812-en
General
-
Target
c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe
-
Size
1.2MB
-
MD5
b2090b4b26b67bf2c63fdc22d67ae176
-
SHA1
454f1f13b9c7d9858d80e45ddead409000c6f831
-
SHA256
c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98
-
SHA512
7141764d6649f435a3cb6a2fe0888faad2184a8fc298ef051b633875bdeca48c3026ee2aba149baed00da7083f7b3b28619544ed1fcab507495043e39bb44344
-
SSDEEP
12288:HPFdPZdPNPFdPZdPqPFdPZdPrPFdPZdPiPFdPZdPFPFdPZdPzSDyTFtj2SDyo1tj:aDyTFtjTDyo1tj
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2408 tmp240565937.exe 2556 notpad.exe 5028 tmp240569843.exe 4944 tmp240569890.exe 1496 notpad.exe 456 tmp240570234.exe 1272 tmp240570296.exe 2060 notpad.exe 3296 tmp240570703.exe 3504 tmp240570765.exe 3032 notpad.exe 1876 tmp240571093.exe 208 tmp240571125.exe 3960 notpad.exe 2012 tmp240571421.exe 1384 tmp240571484.exe 1800 notpad.exe 2436 tmp240571812.exe 2228 tmp240571828.exe 3844 notpad.exe 8 tmp240572109.exe 1108 tmp240572140.exe 2680 notpad.exe 3080 tmp240572453.exe 3028 tmp240572468.exe 4796 notpad.exe 4360 tmp240572765.exe 4204 tmp240572828.exe 3088 notpad.exe 892 tmp240573156.exe 2340 tmp240573203.exe 1980 notpad.exe 4344 tmp240573484.exe 4620 tmp240573515.exe 3212 notpad.exe 1104 tmp240573765.exe 2348 tmp240573781.exe 3628 notpad.exe 1620 tmp240574093.exe 4036 tmp240574140.exe 3544 notpad.exe 608 tmp240574390.exe 2172 tmp240574406.exe 1288 notpad.exe 3800 tmp240574656.exe 1816 tmp240574703.exe 2504 notpad.exe 724 tmp240574984.exe 332 tmp240575031.exe 1152 notpad.exe 656 tmp240575265.exe 4488 tmp240575281.exe 2424 notpad.exe 1452 tmp240575546.exe 2352 tmp240575640.exe 3328 notpad.exe 3060 tmp240575921.exe 4876 tmp240575968.exe 5100 notpad.exe 4912 tmp240576265.exe 4988 tmp240576343.exe 2488 notpad.exe 2428 tmp240576796.exe 1388 tmp240576859.exe -
resource yara_rule behavioral2/memory/4040-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4040-136-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-139.dat upx behavioral2/files/0x0007000000022f4b-138.dat upx behavioral2/files/0x0006000000022f49-143.dat upx behavioral2/memory/2556-147-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-149.dat upx behavioral2/files/0x0006000000022f49-153.dat upx behavioral2/memory/1496-157-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-159.dat upx behavioral2/files/0x0006000000022f49-164.dat upx behavioral2/memory/2060-167-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-169.dat upx behavioral2/files/0x0006000000022f49-173.dat upx behavioral2/memory/3032-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-179.dat upx behavioral2/files/0x0006000000022f49-184.dat upx behavioral2/memory/3960-187-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-189.dat upx behavioral2/files/0x0006000000022f49-193.dat upx behavioral2/memory/1800-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-199.dat upx behavioral2/memory/3844-207-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022f49-204.dat upx behavioral2/files/0x0007000000022f4b-209.dat upx behavioral2/files/0x0006000000022f49-214.dat upx behavioral2/memory/2680-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-219.dat upx behavioral2/memory/4796-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022f49-224.dat upx behavioral2/files/0x0007000000022f4b-229.dat upx behavioral2/files/0x0006000000022f49-234.dat upx behavioral2/memory/3088-237-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022f4b-239.dat upx behavioral2/memory/1980-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3212-246-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3628-250-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3544-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1288-256-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1288-259-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2504-263-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1152-267-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2424-270-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2424-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3328-276-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5100-280-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2488-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2356-285-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4832-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4832-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1908-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3320-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3320-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2788-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4656-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1140-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3216-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3216-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1992-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1560-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4696-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4184-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/944-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/944-301-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240575921.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240581328.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240583703.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240589328.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240588437.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240575265.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240579296.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240585890.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240586156.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240587250.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240591125.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240565937.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240574390.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240575546.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240580781.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240569843.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240570234.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240587890.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240588140.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240591703.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240592796.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240571421.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240574656.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240579781.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240586968.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240590812.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240593093.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240572109.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240573765.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240589000.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240571093.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240577687.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240590281.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240590515.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240592437.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240570703.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240574093.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240576265.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240572453.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240573156.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240576796.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240582171.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240583984.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240586671.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240591390.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240592109.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240573484.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240574984.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240578765.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240584984.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240585250.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240586406.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240589640.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240593359.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240578250.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240583328.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240571812.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240584687.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240585531.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240577250.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240580187.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240572765.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240584328.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmp240587484.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240584687.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240584984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240587890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240589640.exe File created C:\Windows\SysWOW64\notpad.exe tmp240573765.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240579296.exe File created C:\Windows\SysWOW64\notpad.exe tmp240581328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240583703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240592796.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240580187.exe File created C:\Windows\SysWOW64\notpad.exe tmp240583328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240589921.exe File created C:\Windows\SysWOW64\fsb.tmp tmp240565937.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240572765.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240577250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240577687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240571812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240573484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240574984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240574984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240588140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240591390.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240592109.exe File created C:\Windows\SysWOW64\notpad.exe tmp240571812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240591390.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240570234.exe File created C:\Windows\SysWOW64\notpad.exe tmp240574093.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240580781.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240584328.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240586156.exe File created C:\Windows\SysWOW64\notpad.exe tmp240587484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240589328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240572109.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240575265.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240580187.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240585250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240590515.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240571421.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240581328.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240586156.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240582171.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240588140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240588718.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240587484.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240588140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240588718.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240592437.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240573484.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240574984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240585890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240587484.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240588437.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240592109.exe File created C:\Windows\SysWOW64\notpad.exe tmp240592109.exe File created C:\Windows\SysWOW64\notpad.exe tmp240593359.exe File created C:\Windows\SysWOW64\notpad.exe tmp240565937.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240575265.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240585250.exe File created C:\Windows\SysWOW64\notpad.exe tmp240585250.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590515.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240571812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240573484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240580781.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240565937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240581328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240569843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588718.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 2408 4040 c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe 79 PID 4040 wrote to memory of 2408 4040 c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe 79 PID 4040 wrote to memory of 2408 4040 c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe 79 PID 2408 wrote to memory of 2556 2408 tmp240565937.exe 80 PID 2408 wrote to memory of 2556 2408 tmp240565937.exe 80 PID 2408 wrote to memory of 2556 2408 tmp240565937.exe 80 PID 2556 wrote to memory of 5028 2556 notpad.exe 81 PID 2556 wrote to memory of 5028 2556 notpad.exe 81 PID 2556 wrote to memory of 5028 2556 notpad.exe 81 PID 2556 wrote to memory of 4944 2556 notpad.exe 82 PID 2556 wrote to memory of 4944 2556 notpad.exe 82 PID 2556 wrote to memory of 4944 2556 notpad.exe 82 PID 5028 wrote to memory of 1496 5028 tmp240569843.exe 83 PID 5028 wrote to memory of 1496 5028 tmp240569843.exe 83 PID 5028 wrote to memory of 1496 5028 tmp240569843.exe 83 PID 1496 wrote to memory of 456 1496 notpad.exe 84 PID 1496 wrote to memory of 456 1496 notpad.exe 84 PID 1496 wrote to memory of 456 1496 notpad.exe 84 PID 1496 wrote to memory of 1272 1496 notpad.exe 85 PID 1496 wrote to memory of 1272 1496 notpad.exe 85 PID 1496 wrote to memory of 1272 1496 notpad.exe 85 PID 456 wrote to memory of 2060 456 tmp240570234.exe 86 PID 456 wrote to memory of 2060 456 tmp240570234.exe 86 PID 456 wrote to memory of 2060 456 tmp240570234.exe 86 PID 2060 wrote to memory of 3296 2060 notpad.exe 87 PID 2060 wrote to memory of 3296 2060 notpad.exe 87 PID 2060 wrote to memory of 3296 2060 notpad.exe 87 PID 2060 wrote to memory of 3504 2060 notpad.exe 88 PID 2060 wrote to memory of 3504 2060 notpad.exe 88 PID 2060 wrote to memory of 3504 2060 notpad.exe 88 PID 3296 wrote to memory of 3032 3296 tmp240570703.exe 89 PID 3296 wrote to memory of 3032 3296 tmp240570703.exe 89 PID 3296 wrote to memory of 3032 3296 tmp240570703.exe 89 PID 3032 wrote to memory of 1876 3032 notpad.exe 90 PID 3032 wrote to memory of 1876 3032 notpad.exe 90 PID 3032 wrote to memory of 1876 3032 notpad.exe 90 PID 3032 wrote to memory of 208 3032 notpad.exe 91 PID 3032 wrote to memory of 208 3032 notpad.exe 91 PID 3032 wrote to memory of 208 3032 notpad.exe 91 PID 1876 wrote to memory of 3960 1876 tmp240571093.exe 92 PID 1876 wrote to memory of 3960 1876 tmp240571093.exe 92 PID 1876 wrote to memory of 3960 1876 tmp240571093.exe 92 PID 3960 wrote to memory of 2012 3960 notpad.exe 93 PID 3960 wrote to memory of 2012 3960 notpad.exe 93 PID 3960 wrote to memory of 2012 3960 notpad.exe 93 PID 3960 wrote to memory of 1384 3960 notpad.exe 94 PID 3960 wrote to memory of 1384 3960 notpad.exe 94 PID 3960 wrote to memory of 1384 3960 notpad.exe 94 PID 2012 wrote to memory of 1800 2012 tmp240571421.exe 95 PID 2012 wrote to memory of 1800 2012 tmp240571421.exe 95 PID 2012 wrote to memory of 1800 2012 tmp240571421.exe 95 PID 1800 wrote to memory of 2436 1800 notpad.exe 96 PID 1800 wrote to memory of 2436 1800 notpad.exe 96 PID 1800 wrote to memory of 2436 1800 notpad.exe 96 PID 1800 wrote to memory of 2228 1800 notpad.exe 97 PID 1800 wrote to memory of 2228 1800 notpad.exe 97 PID 1800 wrote to memory of 2228 1800 notpad.exe 97 PID 2436 wrote to memory of 3844 2436 tmp240571812.exe 98 PID 2436 wrote to memory of 3844 2436 tmp240571812.exe 98 PID 2436 wrote to memory of 3844 2436 tmp240571812.exe 98 PID 3844 wrote to memory of 8 3844 notpad.exe 99 PID 3844 wrote to memory of 8 3844 notpad.exe 99 PID 3844 wrote to memory of 8 3844 notpad.exe 99 PID 3844 wrote to memory of 1108 3844 notpad.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe"C:\Users\Admin\AppData\Local\Temp\c79694d1beb2096b5ecef44ff9f4213a0523dd060f8705b5ccfe9e9f40c9cd98.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\tmp240565937.exeC:\Users\Admin\AppData\Local\Temp\tmp240565937.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\tmp240569843.exeC:\Users\Admin\AppData\Local\Temp\tmp240569843.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\tmp240570234.exeC:\Users\Admin\AppData\Local\Temp\tmp240570234.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\tmp240570703.exeC:\Users\Admin\AppData\Local\Temp\tmp240570703.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\tmp240571093.exeC:\Users\Admin\AppData\Local\Temp\tmp240571093.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\tmp240571421.exeC:\Users\Admin\AppData\Local\Temp\tmp240571421.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\tmp240571812.exeC:\Users\Admin\AppData\Local\Temp\tmp240571812.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\tmp240572109.exeC:\Users\Admin\AppData\Local\Temp\tmp240572109.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:8 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\tmp240572453.exeC:\Users\Admin\AppData\Local\Temp\tmp240572453.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3080 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\tmp240572765.exeC:\Users\Admin\AppData\Local\Temp\tmp240572765.exe20⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4360 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\tmp240573156.exeC:\Users\Admin\AppData\Local\Temp\tmp240573156.exe22⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\tmp240573484.exeC:\Users\Admin\AppData\Local\Temp\tmp240573484.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4344 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\tmp240573765.exeC:\Users\Admin\AppData\Local\Temp\tmp240573765.exe26⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\tmp240574093.exeC:\Users\Admin\AppData\Local\Temp\tmp240574093.exe28⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\tmp240574390.exeC:\Users\Admin\AppData\Local\Temp\tmp240574390.exe30⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:608 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\tmp240574656.exeC:\Users\Admin\AppData\Local\Temp\tmp240574656.exe32⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3800 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\tmp240574984.exeC:\Users\Admin\AppData\Local\Temp\tmp240574984.exe34⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:724 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\tmp240575265.exeC:\Users\Admin\AppData\Local\Temp\tmp240575265.exe36⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\tmp240575546.exeC:\Users\Admin\AppData\Local\Temp\tmp240575546.exe38⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1452 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\tmp240575921.exeC:\Users\Admin\AppData\Local\Temp\tmp240575921.exe40⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3060 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\tmp240576265.exeC:\Users\Admin\AppData\Local\Temp\tmp240576265.exe42⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\tmp240576796.exeC:\Users\Admin\AppData\Local\Temp\tmp240576796.exe44⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:2428 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\tmp240577250.exeC:\Users\Admin\AppData\Local\Temp\tmp240577250.exe46⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2456 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\tmp240577687.exeC:\Users\Admin\AppData\Local\Temp\tmp240577687.exe48⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\tmp240578250.exeC:\Users\Admin\AppData\Local\Temp\tmp240578250.exe50⤵
- Checks computer location settings
- Modifies registry class
PID:220 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\tmp240578765.exeC:\Users\Admin\AppData\Local\Temp\tmp240578765.exe52⤵
- Checks computer location settings
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\tmp240579296.exeC:\Users\Admin\AppData\Local\Temp\tmp240579296.exe54⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\tmp240579781.exeC:\Users\Admin\AppData\Local\Temp\tmp240579781.exe56⤵
- Checks computer location settings
- Modifies registry class
PID:4428 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\tmp240580187.exeC:\Users\Admin\AppData\Local\Temp\tmp240580187.exe58⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\tmp240580781.exeC:\Users\Admin\AppData\Local\Temp\tmp240580781.exe60⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3260 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\tmp240581328.exeC:\Users\Admin\AppData\Local\Temp\tmp240581328.exe62⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\tmp240582171.exeC:\Users\Admin\AppData\Local\Temp\tmp240582171.exe64⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\tmp240583328.exeC:\Users\Admin\AppData\Local\Temp\tmp240583328.exe66⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\tmp240583703.exeC:\Users\Admin\AppData\Local\Temp\tmp240583703.exe68⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\tmp240583984.exeC:\Users\Admin\AppData\Local\Temp\tmp240583984.exe70⤵
- Checks computer location settings
- Modifies registry class
PID:4036 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\tmp240584328.exeC:\Users\Admin\AppData\Local\Temp\tmp240584328.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\tmp240584687.exeC:\Users\Admin\AppData\Local\Temp\tmp240584687.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3788 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\tmp240584984.exeC:\Users\Admin\AppData\Local\Temp\tmp240584984.exe76⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\tmp240585250.exeC:\Users\Admin\AppData\Local\Temp\tmp240585250.exe78⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\tmp240585531.exeC:\Users\Admin\AppData\Local\Temp\tmp240585531.exe80⤵
- Checks computer location settings
- Modifies registry class
PID:3068 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\tmp240585890.exeC:\Users\Admin\AppData\Local\Temp\tmp240585890.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\tmp240586156.exeC:\Users\Admin\AppData\Local\Temp\tmp240586156.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1156 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\tmp240586406.exeC:\Users\Admin\AppData\Local\Temp\tmp240586406.exe86⤵
- Checks computer location settings
- Modifies registry class
PID:4940 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\tmp240586671.exeC:\Users\Admin\AppData\Local\Temp\tmp240586671.exe88⤵
- Checks computer location settings
- Modifies registry class
PID:2488 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\tmp240586968.exeC:\Users\Admin\AppData\Local\Temp\tmp240586968.exe90⤵
- Checks computer location settings
- Modifies registry class
PID:2060 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\tmp240587250.exeC:\Users\Admin\AppData\Local\Temp\tmp240587250.exe92⤵
- Checks computer location settings
- Modifies registry class
PID:2304 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\tmp240587484.exeC:\Users\Admin\AppData\Local\Temp\tmp240587484.exe94⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\tmp240587890.exeC:\Users\Admin\AppData\Local\Temp\tmp240587890.exe96⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\tmp240588140.exeC:\Users\Admin\AppData\Local\Temp\tmp240588140.exe98⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2720 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\tmp240588437.exeC:\Users\Admin\AppData\Local\Temp\tmp240588437.exe100⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4656 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\tmp240588718.exeC:\Users\Admin\AppData\Local\Temp\tmp240588718.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\tmp240589000.exeC:\Users\Admin\AppData\Local\Temp\tmp240589000.exe104⤵
- Checks computer location settings
- Modifies registry class
PID:3216 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\tmp240589328.exeC:\Users\Admin\AppData\Local\Temp\tmp240589328.exe106⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3184 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\tmp240589640.exeC:\Users\Admin\AppData\Local\Temp\tmp240589640.exe108⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1456 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\tmp240589921.exeC:\Users\Admin\AppData\Local\Temp\tmp240589921.exe110⤵
- Drops file in System32 directory
- Modifies registry class
PID:1848 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\tmp240590281.exeC:\Users\Admin\AppData\Local\Temp\tmp240590281.exe112⤵
- Checks computer location settings
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\tmp240590515.exeC:\Users\Admin\AppData\Local\Temp\tmp240590515.exe114⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3608 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\tmp240590812.exeC:\Users\Admin\AppData\Local\Temp\tmp240590812.exe116⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\tmp240591125.exeC:\Users\Admin\AppData\Local\Temp\tmp240591125.exe118⤵
- Checks computer location settings
- Modifies registry class
PID:532 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\tmp240591390.exeC:\Users\Admin\AppData\Local\Temp\tmp240591390.exe120⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1228 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\tmp240591703.exeC:\Users\Admin\AppData\Local\Temp\tmp240591703.exe122⤵
- Checks computer location settings
- Modifies registry class
PID:788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-