Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 21:00
Behavioral task
behavioral1
Sample
abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe
Resource
win10v2004-20220901-en
General
-
Target
abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe
-
Size
8.9MB
-
MD5
041e587a1b7ea39948e18dfe8531aef2
-
SHA1
839f384f771d71aa7607e07bb149e3b3f49f4d85
-
SHA256
abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991
-
SHA512
715ec4c4d67fb874a14ac80a865f2b67383c3f51c18f04c74f3e25a3e6d498e906ebbe4e27500f66d2a964350c3eb5e62093f2b416afa1dbac75d5e8f10e5336
-
SSDEEP
98304:BtqtptxtItqt8txtItqtvtxtItqtCtxtItqtftxtItqtctxtItqt:bsTrmsCrmslrmsUrms1rmsirms
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3684 tmp240561781.exe 3216 tmp240561828.exe 5076 tmp240561953.exe 3448 tmp240561968.exe 3760 notpad.exe 4332 tmp240562546.exe 1136 tmp240562593.exe 2420 notpad.exe 4984 tmp240562875.exe 4964 tmp240562937.exe 4832 notpad.exe 4588 tmp240563218.exe 1364 tmp240563250.exe 2480 notpad.exe 1652 tmp240563515.exe 2536 tmp240563578.exe 456 notpad.exe 644 tmp240563859.exe 4600 tmp240563890.exe 1480 notpad.exe 4028 tmp240564140.exe 3632 tmp240564187.exe 3456 notpad.exe 4032 tmp240564500.exe 804 tmp240564531.exe 1060 notpad.exe 2404 tmp240564812.exe 1852 tmp240564859.exe 4416 notpad.exe 4172 tmp240565187.exe 4284 tmp240565203.exe 2072 notpad.exe 4784 tmp240565453.exe 5012 tmp240565500.exe 2984 notpad.exe 3616 tmp240565750.exe 3656 tmp240569875.exe 3708 notpad.exe 3660 tmp240570171.exe 2980 tmp240570296.exe 4520 notpad.exe 4592 tmp240570484.exe 3136 tmp240570562.exe 4696 notpad.exe 216 tmp240570765.exe 3696 tmp240570828.exe 1360 notpad.exe 5116 tmp240571046.exe 1472 tmp240571062.exe 840 notpad.exe 3344 tmp240571281.exe 3540 tmp240571312.exe 540 notpad.exe 2784 tmp240571562.exe 3496 tmp240571656.exe 1344 notpad.exe 1136 tmp240571906.exe 2012 tmp240571937.exe 4968 notpad.exe 4964 tmp240572171.exe 4864 tmp240572203.exe 3056 notpad.exe 444 tmp240572437.exe 4164 tmp240572453.exe -
resource yara_rule behavioral2/memory/516-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022df1-137.dat upx behavioral2/memory/516-139-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3216-145-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022df1-138.dat upx behavioral2/files/0x0002000000022df7-148.dat upx behavioral2/files/0x0002000000022df7-149.dat upx behavioral2/files/0x0001000000022df4-153.dat upx behavioral2/memory/3760-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3760-158-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-160.dat upx behavioral2/files/0x0001000000022df4-165.dat upx behavioral2/memory/2420-168-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-170.dat upx behavioral2/memory/4832-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022df4-174.dat upx behavioral2/files/0x0002000000022df7-180.dat upx behavioral2/files/0x0001000000022df4-185.dat upx behavioral2/memory/2480-188-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-190.dat upx behavioral2/files/0x0001000000022df4-195.dat upx behavioral2/memory/456-198-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-200.dat upx behavioral2/files/0x0001000000022df4-204.dat upx behavioral2/memory/1480-208-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-210.dat upx behavioral2/files/0x0001000000022df4-215.dat upx behavioral2/memory/3456-218-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-220.dat upx behavioral2/memory/1060-228-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0001000000022df4-225.dat upx behavioral2/files/0x0002000000022df7-230.dat upx behavioral2/files/0x0001000000022df4-235.dat upx behavioral2/memory/4416-238-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0002000000022df7-240.dat upx behavioral2/memory/2072-243-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2984-245-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2984-248-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3708-252-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4520-256-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4696-258-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4696-261-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1360-265-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/840-269-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/540-273-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1344-277-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4968-281-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3056-285-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4920-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3572-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/456-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2208-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4428-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2176-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4488-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4888-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3412-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2112-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1312-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3660-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/764-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4696-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1360-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1360-301-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240583593.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587187.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation notpad.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240592703.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240572437.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573968.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581078.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240588265.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240591515.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240562875.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240571046.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240571281.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579437.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580640.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573781.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587812.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240564812.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584578.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585203.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240571562.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579890.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580406.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240583125.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580125.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240584312.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240590843.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240574203.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240574421.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578578.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578984.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240573140.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581531.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240593031.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240593734.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240577828.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581250.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation notpad.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240592187.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240592359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240593890.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240561781.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240565750.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240577578.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581734.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585843.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240564140.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579671.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240591140.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586906.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240594046.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240564500.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240575687.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580859.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240591671.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240570484.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240581953.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585453.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586671.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585656.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586046.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587406.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240570765.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240575250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240583343.exe File created C:\Windows\SysWOW64\notpad.exe tmp240585203.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240590671.exe File created C:\Windows\SysWOW64\notpad.exe tmp240564140.exe File created C:\Windows\SysWOW64\notpad.exe tmp240572437.exe File created C:\Windows\SysWOW64\notpad.exe tmp240573546.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240574921.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240575468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240586468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240589375.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590000.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240571046.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584578.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240586671.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240590843.exe File created C:\Windows\SysWOW64\notpad.exe tmp240563515.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240571281.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240575250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240584578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240591515.exe File created C:\Windows\SysWOW64\notpad.exe tmp240592359.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240593562.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240564500.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240574609.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240575687.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240584984.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240587812.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240563515.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240580406.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590328.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240593406.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240578984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240579437.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584312.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240584984.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240585203.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe notpad.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240576125.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240577578.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240588718.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240574203.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240579187.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240579671.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240581531.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240586046.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240586671.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240587187.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240590328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240593734.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240579890.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240585453.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240587406.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590171.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240564812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240579187.exe File created C:\Windows\SysWOW64\notpad.exe tmp240584984.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240565453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240563515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240579890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240578328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240564812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240564140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240581250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240585656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240573968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240594046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240584781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240564500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240565750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240576125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240575890.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 3684 516 abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe 81 PID 516 wrote to memory of 3684 516 abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe 81 PID 516 wrote to memory of 3684 516 abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe 81 PID 516 wrote to memory of 3216 516 abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe 82 PID 516 wrote to memory of 3216 516 abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe 82 PID 516 wrote to memory of 3216 516 abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe 82 PID 3216 wrote to memory of 5076 3216 tmp240561828.exe 83 PID 3216 wrote to memory of 5076 3216 tmp240561828.exe 83 PID 3216 wrote to memory of 5076 3216 tmp240561828.exe 83 PID 3216 wrote to memory of 3448 3216 tmp240561828.exe 84 PID 3216 wrote to memory of 3448 3216 tmp240561828.exe 84 PID 3216 wrote to memory of 3448 3216 tmp240561828.exe 84 PID 3684 wrote to memory of 3760 3684 tmp240561781.exe 85 PID 3684 wrote to memory of 3760 3684 tmp240561781.exe 85 PID 3684 wrote to memory of 3760 3684 tmp240561781.exe 85 PID 3760 wrote to memory of 4332 3760 notpad.exe 86 PID 3760 wrote to memory of 4332 3760 notpad.exe 86 PID 3760 wrote to memory of 4332 3760 notpad.exe 86 PID 3760 wrote to memory of 1136 3760 notpad.exe 87 PID 3760 wrote to memory of 1136 3760 notpad.exe 87 PID 3760 wrote to memory of 1136 3760 notpad.exe 87 PID 4332 wrote to memory of 2420 4332 tmp240562546.exe 88 PID 4332 wrote to memory of 2420 4332 tmp240562546.exe 88 PID 4332 wrote to memory of 2420 4332 tmp240562546.exe 88 PID 2420 wrote to memory of 4984 2420 notpad.exe 89 PID 2420 wrote to memory of 4984 2420 notpad.exe 89 PID 2420 wrote to memory of 4984 2420 notpad.exe 89 PID 2420 wrote to memory of 4964 2420 notpad.exe 90 PID 2420 wrote to memory of 4964 2420 notpad.exe 90 PID 2420 wrote to memory of 4964 2420 notpad.exe 90 PID 4984 wrote to memory of 4832 4984 tmp240562875.exe 91 PID 4984 wrote to memory of 4832 4984 tmp240562875.exe 91 PID 4984 wrote to memory of 4832 4984 tmp240562875.exe 91 PID 4832 wrote to memory of 4588 4832 notpad.exe 92 PID 4832 wrote to memory of 4588 4832 notpad.exe 92 PID 4832 wrote to memory of 4588 4832 notpad.exe 92 PID 4832 wrote to memory of 1364 4832 notpad.exe 93 PID 4832 wrote to memory of 1364 4832 notpad.exe 93 PID 4832 wrote to memory of 1364 4832 notpad.exe 93 PID 4588 wrote to memory of 2480 4588 tmp240563218.exe 94 PID 4588 wrote to memory of 2480 4588 tmp240563218.exe 94 PID 4588 wrote to memory of 2480 4588 tmp240563218.exe 94 PID 2480 wrote to memory of 1652 2480 notpad.exe 95 PID 2480 wrote to memory of 1652 2480 notpad.exe 95 PID 2480 wrote to memory of 1652 2480 notpad.exe 95 PID 2480 wrote to memory of 2536 2480 notpad.exe 96 PID 2480 wrote to memory of 2536 2480 notpad.exe 96 PID 2480 wrote to memory of 2536 2480 notpad.exe 96 PID 1652 wrote to memory of 456 1652 tmp240563515.exe 97 PID 1652 wrote to memory of 456 1652 tmp240563515.exe 97 PID 1652 wrote to memory of 456 1652 tmp240563515.exe 97 PID 456 wrote to memory of 644 456 notpad.exe 98 PID 456 wrote to memory of 644 456 notpad.exe 98 PID 456 wrote to memory of 644 456 notpad.exe 98 PID 456 wrote to memory of 4600 456 notpad.exe 99 PID 456 wrote to memory of 4600 456 notpad.exe 99 PID 456 wrote to memory of 4600 456 notpad.exe 99 PID 644 wrote to memory of 1480 644 tmp240563859.exe 100 PID 644 wrote to memory of 1480 644 tmp240563859.exe 100 PID 644 wrote to memory of 1480 644 tmp240563859.exe 100 PID 1480 wrote to memory of 4028 1480 notpad.exe 101 PID 1480 wrote to memory of 4028 1480 notpad.exe 101 PID 1480 wrote to memory of 4028 1480 notpad.exe 101 PID 1480 wrote to memory of 3632 1480 notpad.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe"C:\Users\Admin\AppData\Local\Temp\abdc56092bd117bc2e5fd49882d9a4326e7aac2151eb2322f381f61ea3f1c991.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\tmp240561781.exeC:\Users\Admin\AppData\Local\Temp\tmp240561781.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\tmp240562546.exeC:\Users\Admin\AppData\Local\Temp\tmp240562546.exe4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\tmp240562875.exeC:\Users\Admin\AppData\Local\Temp\tmp240562875.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\tmp240563218.exeC:\Users\Admin\AppData\Local\Temp\tmp240563218.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\tmp240563515.exeC:\Users\Admin\AppData\Local\Temp\tmp240563515.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\tmp240563859.exeC:\Users\Admin\AppData\Local\Temp\tmp240563859.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\tmp240564140.exeC:\Users\Admin\AppData\Local\Temp\tmp240564140.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\tmp240564500.exeC:\Users\Admin\AppData\Local\Temp\tmp240564500.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\tmp240564812.exeC:\Users\Admin\AppData\Local\Temp\tmp240564812.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\tmp240565187.exeC:\Users\Admin\AppData\Local\Temp\tmp240565187.exe20⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\tmp240565453.exeC:\Users\Admin\AppData\Local\Temp\tmp240565453.exe22⤵
- Executes dropped EXE
- Modifies registry class
PID:4784 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\tmp240565750.exeC:\Users\Admin\AppData\Local\Temp\tmp240565750.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3616 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\tmp240570171.exeC:\Users\Admin\AppData\Local\Temp\tmp240570171.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:3660 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\tmp240570484.exeC:\Users\Admin\AppData\Local\Temp\tmp240570484.exe28⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\tmp240570765.exeC:\Users\Admin\AppData\Local\Temp\tmp240570765.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:216 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\tmp240571046.exeC:\Users\Admin\AppData\Local\Temp\tmp240571046.exe32⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\tmp240571281.exeC:\Users\Admin\AppData\Local\Temp\tmp240571281.exe34⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:3344 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\tmp240571562.exeC:\Users\Admin\AppData\Local\Temp\tmp240571562.exe36⤵
- Executes dropped EXE
- Checks computer location settings
PID:2784 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\tmp240571906.exeC:\Users\Admin\AppData\Local\Temp\tmp240571906.exe38⤵
- Executes dropped EXE
PID:1136 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\tmp240572171.exeC:\Users\Admin\AppData\Local\Temp\tmp240572171.exe40⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\tmp240572437.exeC:\Users\Admin\AppData\Local\Temp\tmp240572437.exe42⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\tmp240572671.exeC:\Users\Admin\AppData\Local\Temp\tmp240572671.exe44⤵PID:1372
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\tmp240572890.exeC:\Users\Admin\AppData\Local\Temp\tmp240572890.exe46⤵PID:1652
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\tmp240573140.exeC:\Users\Admin\AppData\Local\Temp\tmp240573140.exe48⤵
- Checks computer location settings
PID:3588 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\tmp240573328.exeC:\Users\Admin\AppData\Local\Temp\tmp240573328.exe50⤵
- Checks computer location settings
PID:1564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\tmp240573546.exeC:\Users\Admin\AppData\Local\Temp\tmp240573546.exe52⤵
- Drops file in System32 directory
- Modifies registry class
PID:1896 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\tmp240573781.exeC:\Users\Admin\AppData\Local\Temp\tmp240573781.exe54⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\tmp240573968.exeC:\Users\Admin\AppData\Local\Temp\tmp240573968.exe56⤵
- Checks computer location settings
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\tmp240574203.exeC:\Users\Admin\AppData\Local\Temp\tmp240574203.exe58⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2192 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\tmp240574421.exeC:\Users\Admin\AppData\Local\Temp\tmp240574421.exe60⤵
- Checks computer location settings
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\tmp240574609.exeC:\Users\Admin\AppData\Local\Temp\tmp240574609.exe62⤵
- Drops file in System32 directory
PID:1460 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\tmp240574921.exeC:\Users\Admin\AppData\Local\Temp\tmp240574921.exe64⤵
- Drops file in System32 directory
- Modifies registry class
PID:3004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\tmp240575250.exeC:\Users\Admin\AppData\Local\Temp\tmp240575250.exe66⤵
- Drops file in System32 directory
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\tmp240575468.exeC:\Users\Admin\AppData\Local\Temp\tmp240575468.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:4408 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\tmp240575687.exeC:\Users\Admin\AppData\Local\Temp\tmp240575687.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:256 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\tmp240575890.exeC:\Users\Admin\AppData\Local\Temp\tmp240575890.exe72⤵
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\tmp240576125.exeC:\Users\Admin\AppData\Local\Temp\tmp240576125.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:4516 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\tmp240576343.exeC:\Users\Admin\AppData\Local\Temp\tmp240576343.exe76⤵PID:476
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\tmp240576578.exeC:\Users\Admin\AppData\Local\Temp\tmp240576578.exe78⤵PID:1344
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\tmp240576796.exeC:\Users\Admin\AppData\Local\Temp\tmp240576796.exe80⤵PID:4864
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\tmp240577578.exeC:\Users\Admin\AppData\Local\Temp\tmp240577578.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4628 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\tmp240577828.exeC:\Users\Admin\AppData\Local\Temp\tmp240577828.exe84⤵
- Checks computer location settings
PID:2056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\tmp240578078.exeC:\Users\Admin\AppData\Local\Temp\tmp240578078.exe86⤵
- Modifies registry class
PID:3092 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\tmp240578328.exeC:\Users\Admin\AppData\Local\Temp\tmp240578328.exe88⤵
- Checks computer location settings
- Modifies registry class
PID:3940 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\tmp240578578.exeC:\Users\Admin\AppData\Local\Temp\tmp240578578.exe90⤵
- Checks computer location settings
PID:1048 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\tmp240578781.exeC:\Users\Admin\AppData\Local\Temp\tmp240578781.exe92⤵PID:628
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\tmp240578984.exeC:\Users\Admin\AppData\Local\Temp\tmp240578984.exe94⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1228 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\tmp240579187.exeC:\Users\Admin\AppData\Local\Temp\tmp240579187.exe96⤵
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\tmp240579437.exeC:\Users\Admin\AppData\Local\Temp\tmp240579437.exe98⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\tmp240579671.exeC:\Users\Admin\AppData\Local\Temp\tmp240579671.exe100⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\tmp240579890.exeC:\Users\Admin\AppData\Local\Temp\tmp240579890.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\tmp240580125.exeC:\Users\Admin\AppData\Local\Temp\tmp240580125.exe104⤵
- Checks computer location settings
- Modifies registry class
PID:2564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\tmp240580406.exeC:\Users\Admin\AppData\Local\Temp\tmp240580406.exe106⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\tmp240580640.exeC:\Users\Admin\AppData\Local\Temp\tmp240580640.exe108⤵
- Checks computer location settings
PID:4652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\tmp240580859.exeC:\Users\Admin\AppData\Local\Temp\tmp240580859.exe110⤵
- Checks computer location settings
- Modifies registry class
PID:4612 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\tmp240581078.exeC:\Users\Admin\AppData\Local\Temp\tmp240581078.exe112⤵
- Checks computer location settings
PID:4480 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\tmp240581250.exeC:\Users\Admin\AppData\Local\Temp\tmp240581250.exe114⤵
- Checks computer location settings
- Modifies registry class
PID:1900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\tmp240581531.exeC:\Users\Admin\AppData\Local\Temp\tmp240581531.exe116⤵
- Checks computer location settings
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\tmp240581734.exeC:\Users\Admin\AppData\Local\Temp\tmp240581734.exe118⤵
- Checks computer location settings
PID:4864 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\tmp240581953.exeC:\Users\Admin\AppData\Local\Temp\tmp240581953.exe120⤵
- Checks computer location settings
PID:4384 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\tmp240582187.exeC:\Users\Admin\AppData\Local\Temp\tmp240582187.exe122⤵
- Modifies registry class
PID:1504
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-