Analysis
-
max time kernel
154s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 21:06
Behavioral task
behavioral1
Sample
83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe
Resource
win10v2004-20220812-en
General
-
Target
83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe
-
Size
4.8MB
-
MD5
6c6363defccd56b8422d6cac8884d744
-
SHA1
f83d632bd30f53c2eed2b0983ce2544107c96bcf
-
SHA256
83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c
-
SHA512
3b84d224f9282da279165db04a8b5544e37e1b417be3409aa10e8feb3f99936efdd783e67986b1f7df212ea2253af9ba3d4a2492b967aa661d29c083fc6e5408
-
SSDEEP
24576:DDyTFtjeDyo1tjbDyTFtjeDyo1tjVDyTFtjeDyo1tjyDyTFtjeDyo1tjeDyTFtjQ:MtktQtkt2tktrtkt3tktDtktvtkt
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1800 tmp240613859.exe 3844 tmp240614156.exe 1468 tmp240615343.exe 3108 tmp240616046.exe 4720 tmp240616296.exe 2296 tmp240616406.exe 2108 tmp240616734.exe 4780 tmp240616843.exe 1544 tmp240617031.exe 3692 tmp240617187.exe 2636 tmp240617437.exe 2752 tmp240617531.exe 2520 tmp240617703.exe 4068 tmp240617937.exe 2176 notpad.exe 748 tmp240618437.exe 1864 tmp240618500.exe 740 notpad.exe 2216 tmp240618734.exe 2668 notpad.exe 1292 tmp240620921.exe 3168 tmp240621140.exe 4248 notpad.exe 4180 tmp240622000.exe 3052 tmp240621828.exe 1928 notpad.exe 1204 tmp240622218.exe 4228 tmp240622593.exe 1224 tmp240622890.exe 1788 notpad.exe 4276 tmp240623250.exe 4564 tmp240623625.exe 4028 notpad.exe 4268 tmp240623875.exe 2120 notpad.exe 1680 tmp240638500.exe 1648 tmp240631000.exe 3568 tmp240642031.exe 812 notpad.exe 4936 tmp240642843.exe 940 tmp240642875.exe 4824 notpad.exe 2032 tmp240643140.exe 2264 tmp240643171.exe 3004 notpad.exe 3912 tmp240643437.exe 888 tmp240643484.exe 2492 notpad.exe 1356 tmp240643687.exe 4656 tmp240643843.exe 5028 notpad.exe 5096 tmp240644062.exe 4044 tmp240644078.exe 1544 notpad.exe 3388 tmp240644281.exe 3692 tmp240644437.exe 4680 notpad.exe 3924 tmp240644609.exe 4652 notpad.exe 4232 tmp240644625.exe 4148 tmp240644781.exe 4860 tmp240645031.exe 2300 notpad.exe 2584 tmp240645562.exe -
resource yara_rule behavioral2/memory/1280-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e6d-138.dat upx behavioral2/memory/1280-139-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e6d-137.dat upx behavioral2/memory/3844-140-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e7c-146.dat upx behavioral2/memory/3844-147-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e7c-145.dat upx behavioral2/files/0x0006000000022e7f-152.dat upx behavioral2/memory/3108-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e7f-154.dat upx behavioral2/memory/2296-155-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e82-161.dat upx behavioral2/memory/2296-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e82-160.dat upx behavioral2/files/0x0006000000022e85-168.dat upx behavioral2/memory/4780-169-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e85-167.dat upx behavioral2/files/0x0006000000022e87-174.dat upx behavioral2/memory/3692-176-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0006000000022e87-175.dat upx behavioral2/memory/2752-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2752-183-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e79-187.dat upx behavioral2/memory/2176-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e79-197.dat upx behavioral2/files/0x0007000000022e71-191.dat upx behavioral2/files/0x0007000000022e79-186.dat upx behavioral2/memory/740-198-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e71-203.dat upx behavioral2/files/0x0007000000022e79-206.dat upx behavioral2/files/0x0007000000022e71-213.dat upx behavioral2/files/0x0007000000022e79-216.dat upx behavioral2/memory/4248-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2668-218-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e71-224.dat upx behavioral2/memory/740-210-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2668-226-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4248-231-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e79-229.dat upx behavioral2/files/0x0007000000022e71-235.dat upx behavioral2/memory/1928-237-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1928-240-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000022e79-242.dat upx behavioral2/files/0x0007000000022e71-246.dat upx behavioral2/memory/1788-249-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4028-251-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4028-253-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2120-255-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4028-258-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2120-260-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/812-264-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4824-268-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3004-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2492-277-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5028-280-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1544-282-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1544-285-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4680-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4652-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4652-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2300-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3908-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4952-299-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240693265.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240696250.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240710562.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240735859.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240739906.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240622593.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240652859.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240687218.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240692687.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240693734.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240710750.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240643437.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240653734.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240684687.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240734453.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240740218.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240646046.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240648859.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240685203.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240685437.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240694765.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240711296.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240737125.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240742140.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240642843.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240648453.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240694171.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240695843.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240696468.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240613859.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240618734.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240644281.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240735375.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240622000.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240644062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240646390.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240736890.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240738937.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240740421.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240692218.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240711156.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240736296.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240643140.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240644609.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240645562.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240697093.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240709984.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240618437.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240712453.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240737562.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240623250.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240653156.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240653453.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240695062.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240710203.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240734656.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240736593.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240740593.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240741843.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240638500.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240643687.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240644781.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240710984.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation tmp240736125.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240712453.exe File created C:\Windows\SysWOW64\notpad.exe tmp240735859.exe File created C:\Windows\SysWOW64\notpad.exe tmp240742140.exe File created C:\Windows\SysWOW64\notpad.exe tmp240734765.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240696468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240711296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240737125.exe File created C:\Windows\SysWOW64\notpad.exe tmp240739906.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240618437.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240638500.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240653453.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240687218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240653453.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240685484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240648859.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240653156.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240692687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240710562.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240618437.exe File created C:\Windows\SysWOW64\notpad.exe tmp240622593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240623250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240646046.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240741609.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240684687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240741359.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240737562.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240618734.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240644062.exe File created C:\Windows\SysWOW64\notpad.exe tmp240648453.exe File created C:\Windows\SysWOW64\notpad.exe tmp240711156.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240644609.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240645562.exe File created C:\Windows\SysWOW64\notpad.exe tmp240736125.exe File created C:\Windows\SysWOW64\notpad.exe tmp240742375.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240642843.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644281.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240740593.exe File created C:\Windows\SysWOW64\notpad.exe tmp240740421.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240621140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240709984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240734656.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240613859.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240622593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240644062.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240736593.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240693734.exe File created C:\Windows\SysWOW64\notpad.exe tmp240741359.exe File created C:\Windows\SysWOW64\notpad.exe tmp240741843.exe File created C:\Windows\SysWOW64\notpad.exe tmp240621140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240696468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240613859.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644781.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240737406.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240712453.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240621140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240623250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240694171.exe File created C:\Windows\SysWOW64\notpad.exe tmp240697093.exe File created C:\Windows\SysWOW64\notpad.exe tmp240642843.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240644281.exe File created C:\Windows\SysWOW64\notpad.exe tmp240646390.exe File created C:\Windows\SysWOW64\notpad.exe tmp240648859.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240648453.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4660 4068 WerFault.exe 96 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240652859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240696468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240711296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240737406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240735859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240740593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240618437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240685484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240696250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240696671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240710984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240712453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240736296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240685437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240695062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240710203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240739906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240697093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240711156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240734656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240736890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240621140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240622000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240653734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240737125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240653156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240693265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240694765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240737562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240710562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240736593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240741609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240613859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240653453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240622593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240709984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240741359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240742375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240684687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240685203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240710750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240734453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240735375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240735625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240741843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240618734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240687218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240694171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240692687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240736125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240740421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240692218.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1800 1280 83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe 81 PID 1280 wrote to memory of 1800 1280 83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe 81 PID 1280 wrote to memory of 1800 1280 83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe 81 PID 1280 wrote to memory of 3844 1280 83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe 82 PID 1280 wrote to memory of 3844 1280 83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe 82 PID 1280 wrote to memory of 3844 1280 83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe 82 PID 3844 wrote to memory of 1468 3844 tmp240614156.exe 83 PID 3844 wrote to memory of 1468 3844 tmp240614156.exe 83 PID 3844 wrote to memory of 1468 3844 tmp240614156.exe 83 PID 3844 wrote to memory of 3108 3844 tmp240614156.exe 85 PID 3844 wrote to memory of 3108 3844 tmp240614156.exe 85 PID 3844 wrote to memory of 3108 3844 tmp240614156.exe 85 PID 3108 wrote to memory of 4720 3108 tmp240616046.exe 84 PID 3108 wrote to memory of 4720 3108 tmp240616046.exe 84 PID 3108 wrote to memory of 4720 3108 tmp240616046.exe 84 PID 3108 wrote to memory of 2296 3108 tmp240616046.exe 86 PID 3108 wrote to memory of 2296 3108 tmp240616046.exe 86 PID 3108 wrote to memory of 2296 3108 tmp240616046.exe 86 PID 2296 wrote to memory of 2108 2296 tmp240616406.exe 87 PID 2296 wrote to memory of 2108 2296 tmp240616406.exe 87 PID 2296 wrote to memory of 2108 2296 tmp240616406.exe 87 PID 2296 wrote to memory of 4780 2296 tmp240616406.exe 93 PID 2296 wrote to memory of 4780 2296 tmp240616406.exe 93 PID 2296 wrote to memory of 4780 2296 tmp240616406.exe 93 PID 4780 wrote to memory of 1544 4780 tmp240616843.exe 88 PID 4780 wrote to memory of 1544 4780 tmp240616843.exe 88 PID 4780 wrote to memory of 1544 4780 tmp240616843.exe 88 PID 4780 wrote to memory of 3692 4780 tmp240616843.exe 89 PID 4780 wrote to memory of 3692 4780 tmp240616843.exe 89 PID 4780 wrote to memory of 3692 4780 tmp240616843.exe 89 PID 3692 wrote to memory of 2636 3692 tmp240617187.exe 90 PID 3692 wrote to memory of 2636 3692 tmp240617187.exe 90 PID 3692 wrote to memory of 2636 3692 tmp240617187.exe 90 PID 3692 wrote to memory of 2752 3692 tmp240617187.exe 91 PID 3692 wrote to memory of 2752 3692 tmp240617187.exe 91 PID 3692 wrote to memory of 2752 3692 tmp240617187.exe 91 PID 2752 wrote to memory of 2520 2752 tmp240617531.exe 92 PID 2752 wrote to memory of 2520 2752 tmp240617531.exe 92 PID 2752 wrote to memory of 2520 2752 tmp240617531.exe 92 PID 2752 wrote to memory of 4068 2752 tmp240617531.exe 96 PID 2752 wrote to memory of 4068 2752 tmp240617531.exe 96 PID 2752 wrote to memory of 4068 2752 tmp240617531.exe 96 PID 1800 wrote to memory of 2176 1800 tmp240613859.exe 101 PID 1800 wrote to memory of 2176 1800 tmp240613859.exe 101 PID 1800 wrote to memory of 2176 1800 tmp240613859.exe 101 PID 2176 wrote to memory of 748 2176 notpad.exe 97 PID 2176 wrote to memory of 748 2176 notpad.exe 97 PID 2176 wrote to memory of 748 2176 notpad.exe 97 PID 2176 wrote to memory of 1864 2176 notpad.exe 99 PID 2176 wrote to memory of 1864 2176 notpad.exe 99 PID 2176 wrote to memory of 1864 2176 notpad.exe 99 PID 748 wrote to memory of 740 748 tmp240618437.exe 98 PID 748 wrote to memory of 740 748 tmp240618437.exe 98 PID 748 wrote to memory of 740 748 tmp240618437.exe 98 PID 740 wrote to memory of 2216 740 notpad.exe 103 PID 740 wrote to memory of 2216 740 notpad.exe 103 PID 740 wrote to memory of 2216 740 notpad.exe 103 PID 2216 wrote to memory of 2668 2216 tmp240618734.exe 104 PID 2216 wrote to memory of 2668 2216 tmp240618734.exe 104 PID 2216 wrote to memory of 2668 2216 tmp240618734.exe 104 PID 740 wrote to memory of 1292 740 notpad.exe 105 PID 740 wrote to memory of 1292 740 notpad.exe 105 PID 740 wrote to memory of 1292 740 notpad.exe 105 PID 2668 wrote to memory of 3168 2668 notpad.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe"C:\Users\Admin\AppData\Local\Temp\83a50597a8db5f629f1ce1c091a4e8325562485a23f130ca2e57fe5ad0362d1c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\tmp240613859.exeC:\Users\Admin\AppData\Local\Temp\tmp240613859.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240614156.exeC:\Users\Admin\AppData\Local\Temp\tmp240614156.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\tmp240615343.exeC:\Users\Admin\AppData\Local\Temp\tmp240615343.exe3⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616046.exeC:\Users\Admin\AppData\Local\Temp\tmp240616046.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\tmp240616406.exeC:\Users\Admin\AppData\Local\Temp\tmp240616406.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\tmp240616734.exeC:\Users\Admin\AppData\Local\Temp\tmp240616734.exe5⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616843.exeC:\Users\Admin\AppData\Local\Temp\tmp240616843.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616296.exeC:\Users\Admin\AppData\Local\Temp\tmp240616296.exe1⤵
- Executes dropped EXE
PID:4720
-
C:\Users\Admin\AppData\Local\Temp\tmp240617031.exeC:\Users\Admin\AppData\Local\Temp\tmp240617031.exe1⤵
- Executes dropped EXE
PID:1544
-
C:\Users\Admin\AppData\Local\Temp\tmp240617187.exeC:\Users\Admin\AppData\Local\Temp\tmp240617187.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\tmp240617437.exeC:\Users\Admin\AppData\Local\Temp\tmp240617437.exe2⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240617531.exeC:\Users\Admin\AppData\Local\Temp\tmp240617531.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\tmp240617703.exeC:\Users\Admin\AppData\Local\Temp\tmp240617703.exe3⤵
- Executes dropped EXE
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240617937.exeC:\Users\Admin\AppData\Local\Temp\tmp240617937.exe3⤵
- Executes dropped EXE
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 2244⤵
- Program crash
PID:4660
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4068 -ip 40681⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\tmp240618437.exeC:\Users\Admin\AppData\Local\Temp\tmp240618437.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\tmp240618734.exeC:\Users\Admin\AppData\Local\Temp\tmp240618734.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\tmp240621828.exeC:\Users\Admin\AppData\Local\Temp\tmp240621828.exe5⤵
- Executes dropped EXE
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240621140.exeC:\Users\Admin\AppData\Local\Temp\tmp240621140.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240620921.exeC:\Users\Admin\AppData\Local\Temp\tmp240620921.exe3⤵
- Executes dropped EXE
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240618500.exeC:\Users\Admin\AppData\Local\Temp\tmp240618500.exe1⤵
- Executes dropped EXE
PID:1864
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"1⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\tmp240622000.exeC:\Users\Admin\AppData\Local\Temp\tmp240622000.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4180 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\tmp240622593.exeC:\Users\Admin\AppData\Local\Temp\tmp240622593.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4228 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\tmp240623250.exeC:\Users\Admin\AppData\Local\Temp\tmp240623250.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:4276 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\tmp240623875.exeC:\Users\Admin\AppData\Local\Temp\tmp240623875.exe8⤵
- Executes dropped EXE
- Modifies registry class
PID:4268 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\tmp240638500.exeC:\Users\Admin\AppData\Local\Temp\tmp240638500.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1680 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
PID:812 -
C:\Users\Admin\AppData\Local\Temp\tmp240642843.exeC:\Users\Admin\AppData\Local\Temp\tmp240642843.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4936 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\tmp240643140.exeC:\Users\Admin\AppData\Local\Temp\tmp240643140.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\tmp240643437.exeC:\Users\Admin\AppData\Local\Temp\tmp240643437.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\tmp240643687.exeC:\Users\Admin\AppData\Local\Temp\tmp240643687.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\tmp240644062.exeC:\Users\Admin\AppData\Local\Temp\tmp240644062.exe20⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:5096 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\tmp240644281.exeC:\Users\Admin\AppData\Local\Temp\tmp240644281.exe22⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3388 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\tmp240644609.exeC:\Users\Admin\AppData\Local\Temp\tmp240644609.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\tmp240644781.exeC:\Users\Admin\AppData\Local\Temp\tmp240644781.exe26⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:4148 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\tmp240645562.exeC:\Users\Admin\AppData\Local\Temp\tmp240645562.exe28⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\tmp240646046.exeC:\Users\Admin\AppData\Local\Temp\tmp240646046.exe30⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\tmp240646390.exeC:\Users\Admin\AppData\Local\Temp\tmp240646390.exe32⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1644 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\tmp240648453.exeC:\Users\Admin\AppData\Local\Temp\tmp240648453.exe34⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\tmp240648859.exeC:\Users\Admin\AppData\Local\Temp\tmp240648859.exe36⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3740 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\tmp240652859.exeC:\Users\Admin\AppData\Local\Temp\tmp240652859.exe38⤵
- Checks computer location settings
- Modifies registry class
PID:4168 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\tmp240653156.exeC:\Users\Admin\AppData\Local\Temp\tmp240653156.exe40⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2452 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\tmp240653453.exeC:\Users\Admin\AppData\Local\Temp\tmp240653453.exe42⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2696 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\tmp240653734.exeC:\Users\Admin\AppData\Local\Temp\tmp240653734.exe44⤵
- Checks computer location settings
- Modifies registry class
PID:1020 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\tmp240684687.exeC:\Users\Admin\AppData\Local\Temp\tmp240684687.exe46⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2620 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\tmp240685203.exeC:\Users\Admin\AppData\Local\Temp\tmp240685203.exe48⤵
- Checks computer location settings
- Modifies registry class
PID:316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\tmp240685437.exeC:\Users\Admin\AppData\Local\Temp\tmp240685437.exe50⤵
- Checks computer location settings
- Modifies registry class
PID:3388 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\tmp240685671.exeC:\Users\Admin\AppData\Local\Temp\tmp240685671.exe52⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240687000.exeC:\Users\Admin\AppData\Local\Temp\tmp240687000.exe52⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\tmp240687078.exeC:\Users\Admin\AppData\Local\Temp\tmp240687078.exe53⤵PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240687109.exeC:\Users\Admin\AppData\Local\Temp\tmp240687109.exe53⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\tmp240687171.exeC:\Users\Admin\AppData\Local\Temp\tmp240687171.exe54⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240687203.exeC:\Users\Admin\AppData\Local\Temp\tmp240687203.exe54⤵PID:4216
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240685453.exeC:\Users\Admin\AppData\Local\Temp\tmp240685453.exe50⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\tmp240685484.exeC:\Users\Admin\AppData\Local\Temp\tmp240685484.exe51⤵
- Drops file in System32 directory
- Modifies registry class
PID:4652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\tmp240687218.exeC:\Users\Admin\AppData\Local\Temp\tmp240687218.exe53⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\tmp240691687.exeC:\Users\Admin\AppData\Local\Temp\tmp240691687.exe55⤵PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240692515.exeC:\Users\Admin\AppData\Local\Temp\tmp240692515.exe55⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\tmp240693093.exeC:\Users\Admin\AppData\Local\Temp\tmp240693093.exe56⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240693140.exeC:\Users\Admin\AppData\Local\Temp\tmp240693140.exe56⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\tmp240693265.exeC:\Users\Admin\AppData\Local\Temp\tmp240693265.exe57⤵
- Checks computer location settings
- Modifies registry class
PID:1060 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\tmp240693828.exeC:\Users\Admin\AppData\Local\Temp\tmp240693828.exe59⤵PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240693968.exeC:\Users\Admin\AppData\Local\Temp\tmp240693968.exe59⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\tmp240694062.exeC:\Users\Admin\AppData\Local\Temp\tmp240694062.exe60⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240694109.exeC:\Users\Admin\AppData\Local\Temp\tmp240694109.exe60⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\tmp240694171.exeC:\Users\Admin\AppData\Local\Temp\tmp240694171.exe61⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\tmp240694453.exeC:\Users\Admin\AppData\Local\Temp\tmp240694453.exe63⤵PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240694796.exeC:\Users\Admin\AppData\Local\Temp\tmp240694796.exe63⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\tmp240694890.exeC:\Users\Admin\AppData\Local\Temp\tmp240694890.exe64⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240694906.exeC:\Users\Admin\AppData\Local\Temp\tmp240694906.exe64⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\tmp240695062.exeC:\Users\Admin\AppData\Local\Temp\tmp240695062.exe65⤵
- Checks computer location settings
- Modifies registry class
PID:4720 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\tmp240695843.exeC:\Users\Admin\AppData\Local\Temp\tmp240695843.exe67⤵
- Checks computer location settings
PID:4888 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\tmp240696265.exeC:\Users\Admin\AppData\Local\Temp\tmp240696265.exe69⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240696281.exeC:\Users\Admin\AppData\Local\Temp\tmp240696281.exe69⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\tmp240696343.exeC:\Users\Admin\AppData\Local\Temp\tmp240696343.exe70⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240696359.exeC:\Users\Admin\AppData\Local\Temp\tmp240696359.exe70⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\tmp240696390.exeC:\Users\Admin\AppData\Local\Temp\tmp240696390.exe71⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240696406.exeC:\Users\Admin\AppData\Local\Temp\tmp240696406.exe71⤵PID:4300
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240696015.exeC:\Users\Admin\AppData\Local\Temp\tmp240696015.exe67⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\tmp240696140.exeC:\Users\Admin\AppData\Local\Temp\tmp240696140.exe68⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240696156.exeC:\Users\Admin\AppData\Local\Temp\tmp240696156.exe68⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\tmp240696250.exeC:\Users\Admin\AppData\Local\Temp\tmp240696250.exe69⤵
- Checks computer location settings
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\tmp240696468.exeC:\Users\Admin\AppData\Local\Temp\tmp240696468.exe71⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2572 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\tmp240696671.exeC:\Users\Admin\AppData\Local\Temp\tmp240696671.exe73⤵
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\tmp240709734.exeC:\Users\Admin\AppData\Local\Temp\tmp240709734.exe75⤵PID:4184
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240709828.exeC:\Users\Admin\AppData\Local\Temp\tmp240709828.exe75⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\tmp240709875.exeC:\Users\Admin\AppData\Local\Temp\tmp240709875.exe76⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240709921.exeC:\Users\Admin\AppData\Local\Temp\tmp240709921.exe76⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\tmp240709984.exeC:\Users\Admin\AppData\Local\Temp\tmp240709984.exe77⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2172 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\tmp240710203.exeC:\Users\Admin\AppData\Local\Temp\tmp240710203.exe79⤵
- Checks computer location settings
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\tmp240710562.exeC:\Users\Admin\AppData\Local\Temp\tmp240710562.exe81⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\tmp240710765.exeC:\Users\Admin\AppData\Local\Temp\tmp240710765.exe83⤵PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240710812.exeC:\Users\Admin\AppData\Local\Temp\tmp240710812.exe83⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\tmp240710890.exeC:\Users\Admin\AppData\Local\Temp\tmp240710890.exe84⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\tmp240710921.exeC:\Users\Admin\AppData\Local\Temp\tmp240710921.exe85⤵PID:204
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240710937.exeC:\Users\Admin\AppData\Local\Temp\tmp240710937.exe85⤵PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240710859.exeC:\Users\Admin\AppData\Local\Temp\tmp240710859.exe84⤵PID:4400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240710593.exeC:\Users\Admin\AppData\Local\Temp\tmp240710593.exe81⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\tmp240710671.exeC:\Users\Admin\AppData\Local\Temp\tmp240710671.exe82⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240710718.exeC:\Users\Admin\AppData\Local\Temp\tmp240710718.exe82⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\tmp240710750.exeC:\Users\Admin\AppData\Local\Temp\tmp240710750.exe83⤵
- Checks computer location settings
- Modifies registry class
PID:4204 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\tmp240710984.exeC:\Users\Admin\AppData\Local\Temp\tmp240710984.exe85⤵
- Checks computer location settings
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\tmp240711156.exeC:\Users\Admin\AppData\Local\Temp\tmp240711156.exe87⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\tmp240711343.exeC:\Users\Admin\AppData\Local\Temp\tmp240711343.exe89⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240712015.exeC:\Users\Admin\AppData\Local\Temp\tmp240712015.exe89⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\tmp240712218.exeC:\Users\Admin\AppData\Local\Temp\tmp240712218.exe90⤵PID:1292
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\tmp240712531.exeC:\Users\Admin\AppData\Local\Temp\tmp240712531.exe92⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240732343.exeC:\Users\Admin\AppData\Local\Temp\tmp240732343.exe92⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\tmp240733734.exeC:\Users\Admin\AppData\Local\Temp\tmp240733734.exe93⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240734500.exeC:\Users\Admin\AppData\Local\Temp\tmp240734500.exe93⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\tmp240734625.exeC:\Users\Admin\AppData\Local\Temp\tmp240734625.exe94⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240734734.exeC:\Users\Admin\AppData\Local\Temp\tmp240734734.exe94⤵PID:4256
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240712250.exeC:\Users\Admin\AppData\Local\Temp\tmp240712250.exe90⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\tmp240712328.exeC:\Users\Admin\AppData\Local\Temp\tmp240712328.exe91⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240712406.exeC:\Users\Admin\AppData\Local\Temp\tmp240712406.exe91⤵PID:1548
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240711203.exeC:\Users\Admin\AppData\Local\Temp\tmp240711203.exe87⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\tmp240711250.exeC:\Users\Admin\AppData\Local\Temp\tmp240711250.exe88⤵PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240711265.exeC:\Users\Admin\AppData\Local\Temp\tmp240711265.exe88⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\tmp240711296.exeC:\Users\Admin\AppData\Local\Temp\tmp240711296.exe89⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4452 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\tmp240712234.exeC:\Users\Admin\AppData\Local\Temp\tmp240712234.exe91⤵PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240712281.exeC:\Users\Admin\AppData\Local\Temp\tmp240712281.exe91⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\tmp240712359.exeC:\Users\Admin\AppData\Local\Temp\tmp240712359.exe92⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240712390.exeC:\Users\Admin\AppData\Local\Temp\tmp240712390.exe92⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\tmp240712453.exeC:\Users\Admin\AppData\Local\Temp\tmp240712453.exe93⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"94⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\tmp240734468.exeC:\Users\Admin\AppData\Local\Temp\tmp240734468.exe95⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\tmp240734546.exeC:\Users\Admin\AppData\Local\Temp\tmp240734546.exe96⤵PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240734609.exeC:\Users\Admin\AppData\Local\Temp\tmp240734609.exe96⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\tmp240734765.exeC:\Users\Admin\AppData\Local\Temp\tmp240734765.exe97⤵
- Drops file in System32 directory
PID:2620 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\tmp240735421.exeC:\Users\Admin\AppData\Local\Temp\tmp240735421.exe99⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240735437.exeC:\Users\Admin\AppData\Local\Temp\tmp240735437.exe99⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\tmp240735515.exeC:\Users\Admin\AppData\Local\Temp\tmp240735515.exe100⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240735578.exeC:\Users\Admin\AppData\Local\Temp\tmp240735578.exe100⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\tmp240735625.exeC:\Users\Admin\AppData\Local\Temp\tmp240735625.exe101⤵
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\tmp240736000.exeC:\Users\Admin\AppData\Local\Temp\tmp240736000.exe103⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736062.exeC:\Users\Admin\AppData\Local\Temp\tmp240736062.exe103⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\tmp240736125.exeC:\Users\Admin\AppData\Local\Temp\tmp240736125.exe104⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3464 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\tmp240736343.exeC:\Users\Admin\AppData\Local\Temp\tmp240736343.exe106⤵PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736406.exeC:\Users\Admin\AppData\Local\Temp\tmp240736406.exe106⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\tmp240736531.exeC:\Users\Admin\AppData\Local\Temp\tmp240736531.exe107⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\tmp240736609.exeC:\Users\Admin\AppData\Local\Temp\tmp240736609.exe108⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736671.exeC:\Users\Admin\AppData\Local\Temp\tmp240736671.exe108⤵PID:4968
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736484.exeC:\Users\Admin\AppData\Local\Temp\tmp240736484.exe107⤵PID:3012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736156.exeC:\Users\Admin\AppData\Local\Temp\tmp240736156.exe104⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\tmp240736218.exeC:\Users\Admin\AppData\Local\Temp\tmp240736218.exe105⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736281.exeC:\Users\Admin\AppData\Local\Temp\tmp240736281.exe105⤵PID:868
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240735656.exeC:\Users\Admin\AppData\Local\Temp\tmp240735656.exe101⤵PID:4544
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240735109.exeC:\Users\Admin\AppData\Local\Temp\tmp240735109.exe97⤵PID:3088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240734453.exeC:\Users\Admin\AppData\Local\Temp\tmp240734453.exe95⤵
- Checks computer location settings
- Modifies registry class
PID:4868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\tmp240734656.exeC:\Users\Admin\AppData\Local\Temp\tmp240734656.exe97⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:64 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\tmp240734906.exeC:\Users\Admin\AppData\Local\Temp\tmp240734906.exe99⤵PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240735281.exeC:\Users\Admin\AppData\Local\Temp\tmp240735281.exe99⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\tmp240735375.exeC:\Users\Admin\AppData\Local\Temp\tmp240735375.exe100⤵
- Checks computer location settings
- Modifies registry class
PID:1844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\tmp240735671.exeC:\Users\Admin\AppData\Local\Temp\tmp240735671.exe102⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240735750.exeC:\Users\Admin\AppData\Local\Temp\tmp240735750.exe102⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\tmp240735859.exeC:\Users\Admin\AppData\Local\Temp\tmp240735859.exe103⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3880 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\tmp240736171.exeC:\Users\Admin\AppData\Local\Temp\tmp240736171.exe105⤵PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240736203.exeC:\Users\Admin\AppData\Local\Temp\tmp240736203.exe105⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\tmp240736296.exeC:\Users\Admin\AppData\Local\Temp\tmp240736296.exe106⤵
- Checks computer location settings
- Modifies registry class
PID:3612 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\tmp240736593.exeC:\Users\Admin\AppData\Local\Temp\tmp240736593.exe108⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4728 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\tmp240736890.exeC:\Users\Admin\AppData\Local\Temp\tmp240736890.exe110⤵
- Checks computer location settings
- Modifies registry class
PID:3444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\tmp240737125.exeC:\Users\Admin\AppData\Local\Temp\tmp240737125.exe112⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\tmp240737406.exeC:\Users\Admin\AppData\Local\Temp\tmp240737406.exe114⤵
- Drops file in System32 directory
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\tmp240737562.exeC:\Users\Admin\AppData\Local\Temp\tmp240737562.exe116⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\tmp240738937.exeC:\Users\Admin\AppData\Local\Temp\tmp240738937.exe118⤵
- Checks computer location settings
PID:5008 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\tmp240739781.exeC:\Users\Admin\AppData\Local\Temp\tmp240739781.exe120⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240740000.exeC:\Users\Admin\AppData\Local\Temp\tmp240740000.exe120⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\tmp240740062.exeC:\Users\Admin\AppData\Local\Temp\tmp240740062.exe121⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240740125.exeC:\Users\Admin\AppData\Local\Temp\tmp240740125.exe121⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\tmp240740218.exeC:\Users\Admin\AppData\Local\Temp\tmp240740218.exe122⤵
- Checks computer location settings
PID:4708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-