Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:03
Behavioral task
behavioral1
Sample
374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe
-
Size
828KB
-
MD5
374b4a38a4cc8d687c87b0868cb71b90
-
SHA1
48a4c62588952da4e6f8e443174d05bb7d66a318
-
SHA256
0564485a47dcd739fe9a79f85ccc311bae4ed21bf5860011d6000b4cc4591c92
-
SHA512
55dcc8854e7f4ae1cced372c2adbe166fffadbedaf64c3b849b2d54eb52b8d4ffa692260f679840ea7e611af02d7ff5ee9a09bce813bf240be958c6da7ca82d5
-
SSDEEP
24576:ZDyTFtjSDyTFtjsDyTFtjSDyTFtjODyo1tj:utztZtztUt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 62 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240640593.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642203.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240646625.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240646765.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647312.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240643328.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240646125.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240643921.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644140.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240648421.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642687.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240643671.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644421.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240645687.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240646468.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240639546.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642546.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644843.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240648953.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240638109.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240639890.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240640406.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644031.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647000.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240648109.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240637718.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642812.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647765.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240648546.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240637109.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240641609.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647437.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647921.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642953.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644703.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240645312.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647578.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240637921.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642031.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240638468.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240641218.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240641453.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644609.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240647140.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240639687.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240641859.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240646281.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240643796.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240644281.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240645109.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240645890.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240648265.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240638265.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240639312.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240640046.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240640234.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240642406.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240643109.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240638656.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240640828.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240641046.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240648671.exe -
Executes dropped EXE 64 IoCs
pid Process 1892 tmp240637109.exe 3064 tmp240637125.exe 4976 notpad.exe 1856 tmp240637718.exe 3360 tmp240637734.exe 4344 notpad.exe 5016 tmp240637921.exe 1868 tmp240637937.exe 2116 notpad.exe 4868 tmp240638109.exe 4372 tmp240638125.exe 4676 notpad.exe 1064 tmp240638265.exe 4720 tmp240638312.exe 4956 notpad.exe 996 tmp240638468.exe 2820 tmp240638500.exe 2972 notpad.exe 4728 tmp240638656.exe 3232 tmp240638671.exe 3544 notpad.exe 4800 tmp240639312.exe 1084 tmp240639328.exe 2956 tmp240639390.exe 2672 tmp240639421.exe 3772 notpad.exe 4888 tmp240639500.exe 4428 tmp240639515.exe 4496 tmp240639546.exe 2024 tmp240639578.exe 4716 notpad.exe 3660 tmp240639687.exe 4528 tmp240639703.exe 4292 tmp240639765.exe 4556 tmp240639781.exe 3516 notpad.exe 4396 tmp240639890.exe 2272 tmp240639906.exe 2592 tmp240639937.exe 4072 tmp240639953.exe 4024 notpad.exe 1060 tmp240640046.exe 2116 tmp240640062.exe 3464 tmp240640093.exe 2740 tmp240640109.exe 3816 tmp240640171.exe 4720 tmp240640187.exe 3016 notpad.exe 4452 tmp240640234.exe 3740 tmp240640250.exe 996 tmp240640296.exe 968 tmp240640328.exe 3276 tmp240640359.exe 3784 tmp240640375.exe 2716 notpad.exe 2884 tmp240640406.exe 3796 tmp240640421.exe 4364 tmp240640437.exe 1948 tmp240640468.exe 2672 tmp240640515.exe 3212 tmp240640546.exe 4800 notpad.exe 5024 tmp240640609.exe 4820 tmp240640593.exe -
resource yara_rule behavioral2/memory/544-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/544-12-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00070000000234c5-24.dat upx behavioral2/memory/4976-54-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00070000000234c1-42.dat upx behavioral2/memory/4344-58-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4344-77-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2116-99-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4676-103-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4676-122-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4956-144-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2972-148-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2972-164-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00080000000234c5-175.dat upx behavioral2/memory/3544-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3544-199-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1084-210-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3772-218-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4528-263-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4528-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4716-262-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4428-243-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3772-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3516-285-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2272-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2272-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4024-316-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2116-319-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2116-330-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2740-332-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2740-343-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3016-347-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3740-357-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3016-362-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3740-370-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/968-371-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/968-377-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3784-399-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1948-403-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2716-402-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1948-411-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3212-412-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4800-416-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5024-421-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3212-420-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5024-437-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4800-445-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4432-455-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1116-452-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1116-476-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5084-477-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5084-488-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1856-492-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4136-495-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4020-504-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4948-507-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1760-505-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4660-525-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1760-530-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4948-527-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1060-540-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4180-542-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4660-539-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2028-561-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe- tmp240639546.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240642406.exe File created C:\Windows\SysWOW64\notpad.exe tmp240642406.exe File created C:\Windows\SysWOW64\notpad.exe tmp240642687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240645890.exe File created C:\Windows\SysWOW64\notpad.exe tmp240646125.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240638109.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240639312.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240647140.exe File created C:\Windows\SysWOW64\notpad.exe tmp240641859.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240643328.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240640046.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240641046.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240647312.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240648265.exe File created C:\Windows\SysWOW64\notpad.exe tmp240637921.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240641218.exe File created C:\Windows\SysWOW64\notpad.exe tmp240646468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240647765.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240642687.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644843.exe File created C:\Windows\SysWOW64\notpad.exe tmp240642546.exe File created C:\Windows\SysWOW64\notpad.exe tmp240643671.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240646468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240648265.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240648953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240639890.exe File created C:\Windows\SysWOW64\notpad.exe tmp240641609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240640828.exe File created C:\Windows\SysWOW64\notpad.exe tmp240641046.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240643921.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240646281.exe File created C:\Windows\SysWOW64\notpad.exe tmp240647000.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240648546.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240639687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240639687.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240642812.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240644140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240645687.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240638265.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240642546.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240643109.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240646125.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240647000.exe File created C:\Windows\SysWOW64\notpad.exe tmp240647312.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240648109.exe File created C:\Windows\SysWOW64\notpad.exe tmp240649125.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240639890.exe File created C:\Windows\SysWOW64\notpad.exe tmp240640234.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240642546.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240642687.exe File created C:\Windows\SysWOW64\notpad.exe tmp240645109.exe File created C:\Windows\SysWOW64\notpad.exe tmp240638468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240641218.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240644031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240640593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240641859.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240643328.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240643796.exe File created C:\Windows\SysWOW64\notpad.exe tmp240643921.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240638468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240642953.exe File created C:\Windows\SysWOW64\notpad.exe tmp240639546.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240637718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240637109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240637921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646765.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 1892 544 374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe 83 PID 544 wrote to memory of 1892 544 374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe 83 PID 544 wrote to memory of 1892 544 374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe 83 PID 544 wrote to memory of 3064 544 374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe 84 PID 544 wrote to memory of 3064 544 374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe 84 PID 544 wrote to memory of 3064 544 374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe 84 PID 1892 wrote to memory of 4976 1892 tmp240637109.exe 86 PID 1892 wrote to memory of 4976 1892 tmp240637109.exe 86 PID 1892 wrote to memory of 4976 1892 tmp240637109.exe 86 PID 4976 wrote to memory of 1856 4976 notpad.exe 87 PID 4976 wrote to memory of 1856 4976 notpad.exe 87 PID 4976 wrote to memory of 1856 4976 notpad.exe 87 PID 4976 wrote to memory of 3360 4976 notpad.exe 88 PID 4976 wrote to memory of 3360 4976 notpad.exe 88 PID 4976 wrote to memory of 3360 4976 notpad.exe 88 PID 1856 wrote to memory of 4344 1856 tmp240637718.exe 89 PID 1856 wrote to memory of 4344 1856 tmp240637718.exe 89 PID 1856 wrote to memory of 4344 1856 tmp240637718.exe 89 PID 4344 wrote to memory of 5016 4344 notpad.exe 90 PID 4344 wrote to memory of 5016 4344 notpad.exe 90 PID 4344 wrote to memory of 5016 4344 notpad.exe 90 PID 4344 wrote to memory of 1868 4344 notpad.exe 91 PID 4344 wrote to memory of 1868 4344 notpad.exe 91 PID 4344 wrote to memory of 1868 4344 notpad.exe 91 PID 5016 wrote to memory of 2116 5016 tmp240637921.exe 128 PID 5016 wrote to memory of 2116 5016 tmp240637921.exe 128 PID 5016 wrote to memory of 2116 5016 tmp240637921.exe 128 PID 2116 wrote to memory of 4868 2116 notpad.exe 94 PID 2116 wrote to memory of 4868 2116 notpad.exe 94 PID 2116 wrote to memory of 4868 2116 notpad.exe 94 PID 2116 wrote to memory of 4372 2116 notpad.exe 95 PID 2116 wrote to memory of 4372 2116 notpad.exe 95 PID 2116 wrote to memory of 4372 2116 notpad.exe 95 PID 4868 wrote to memory of 4676 4868 tmp240638109.exe 96 PID 4868 wrote to memory of 4676 4868 tmp240638109.exe 96 PID 4868 wrote to memory of 4676 4868 tmp240638109.exe 96 PID 4676 wrote to memory of 1064 4676 notpad.exe 329 PID 4676 wrote to memory of 1064 4676 notpad.exe 329 PID 4676 wrote to memory of 1064 4676 notpad.exe 329 PID 4676 wrote to memory of 4720 4676 notpad.exe 132 PID 4676 wrote to memory of 4720 4676 notpad.exe 132 PID 4676 wrote to memory of 4720 4676 notpad.exe 132 PID 1064 wrote to memory of 4956 1064 tmp240638265.exe 100 PID 1064 wrote to memory of 4956 1064 tmp240638265.exe 100 PID 1064 wrote to memory of 4956 1064 tmp240638265.exe 100 PID 4956 wrote to memory of 996 4956 notpad.exe 136 PID 4956 wrote to memory of 996 4956 notpad.exe 136 PID 4956 wrote to memory of 996 4956 notpad.exe 136 PID 4956 wrote to memory of 2820 4956 notpad.exe 337 PID 4956 wrote to memory of 2820 4956 notpad.exe 337 PID 4956 wrote to memory of 2820 4956 notpad.exe 337 PID 996 wrote to memory of 2972 996 tmp240638468.exe 464 PID 996 wrote to memory of 2972 996 tmp240638468.exe 464 PID 996 wrote to memory of 2972 996 tmp240638468.exe 464 PID 2972 wrote to memory of 4728 2972 notpad.exe 539 PID 2972 wrote to memory of 4728 2972 notpad.exe 539 PID 2972 wrote to memory of 4728 2972 notpad.exe 539 PID 2972 wrote to memory of 3232 2972 notpad.exe 482 PID 2972 wrote to memory of 3232 2972 notpad.exe 482 PID 2972 wrote to memory of 3232 2972 notpad.exe 482 PID 4728 wrote to memory of 3544 4728 tmp240638656.exe 106 PID 4728 wrote to memory of 3544 4728 tmp240638656.exe 106 PID 4728 wrote to memory of 3544 4728 tmp240638656.exe 106 PID 3544 wrote to memory of 4800 3544 notpad.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\374b4a38a4cc8d687c87b0868cb71b90_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\tmp240637109.exeC:\Users\Admin\AppData\Local\Temp\tmp240637109.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\tmp240637718.exeC:\Users\Admin\AppData\Local\Temp\tmp240637718.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\tmp240637921.exeC:\Users\Admin\AppData\Local\Temp\tmp240637921.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\tmp240638109.exeC:\Users\Admin\AppData\Local\Temp\tmp240638109.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\tmp240638265.exeC:\Users\Admin\AppData\Local\Temp\tmp240638265.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\tmp240638468.exeC:\Users\Admin\AppData\Local\Temp\tmp240638468.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\tmp240638656.exeC:\Users\Admin\AppData\Local\Temp\tmp240638656.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\tmp240639312.exeC:\Users\Admin\AppData\Local\Temp\tmp240639312.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4800 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\tmp240639500.exeC:\Users\Admin\AppData\Local\Temp\tmp240639500.exe18⤵
- Executes dropped EXE
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639515.exeC:\Users\Admin\AppData\Local\Temp\tmp240639515.exe18⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\tmp240639546.exeC:\Users\Admin\AppData\Local\Temp\tmp240639546.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\tmp240639687.exeC:\Users\Admin\AppData\Local\Temp\tmp240639687.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3660 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\tmp240639890.exeC:\Users\Admin\AppData\Local\Temp\tmp240639890.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\tmp240640046.exeC:\Users\Admin\AppData\Local\Temp\tmp240640046.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1060 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\tmp240640234.exeC:\Users\Admin\AppData\Local\Temp\tmp240640234.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4452 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵
- Executes dropped EXE
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\tmp240640437.exeC:\Users\Admin\AppData\Local\Temp\tmp240640437.exe29⤵
- Executes dropped EXE
PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640468.exeC:\Users\Admin\AppData\Local\Temp\tmp240640468.exe29⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\tmp240640515.exeC:\Users\Admin\AppData\Local\Temp\tmp240640515.exe30⤵
- Executes dropped EXE
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640546.exeC:\Users\Admin\AppData\Local\Temp\tmp240640546.exe30⤵
- Executes dropped EXE
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\tmp240640593.exeC:\Users\Admin\AppData\Local\Temp\tmp240640593.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4820 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\tmp240640812.exeC:\Users\Admin\AppData\Local\Temp\tmp240640812.exe33⤵PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640859.exeC:\Users\Admin\AppData\Local\Temp\tmp240640859.exe33⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\tmp240640921.exeC:\Users\Admin\AppData\Local\Temp\tmp240640921.exe34⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640937.exeC:\Users\Admin\AppData\Local\Temp\tmp240640937.exe34⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\tmp240641000.exeC:\Users\Admin\AppData\Local\Temp\tmp240641000.exe35⤵PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641015.exeC:\Users\Admin\AppData\Local\Temp\tmp240641015.exe35⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\tmp240641046.exeC:\Users\Admin\AppData\Local\Temp\tmp240641046.exe36⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4884 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\tmp240641218.exeC:\Users\Admin\AppData\Local\Temp\tmp240641218.exe38⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1212 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\tmp240641468.exeC:\Users\Admin\AppData\Local\Temp\tmp240641468.exe40⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641484.exeC:\Users\Admin\AppData\Local\Temp\tmp240641484.exe40⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\tmp240641546.exeC:\Users\Admin\AppData\Local\Temp\tmp240641546.exe41⤵PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641562.exeC:\Users\Admin\AppData\Local\Temp\tmp240641562.exe41⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\tmp240641609.exeC:\Users\Admin\AppData\Local\Temp\tmp240641609.exe42⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\tmp240641843.exeC:\Users\Admin\AppData\Local\Temp\tmp240641843.exe44⤵PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641890.exeC:\Users\Admin\AppData\Local\Temp\tmp240641890.exe44⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\tmp240641937.exeC:\Users\Admin\AppData\Local\Temp\tmp240641937.exe45⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641953.exeC:\Users\Admin\AppData\Local\Temp\tmp240641953.exe45⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\tmp240641984.exeC:\Users\Admin\AppData\Local\Temp\tmp240641984.exe46⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642000.exeC:\Users\Admin\AppData\Local\Temp\tmp240642000.exe46⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\tmp240642046.exeC:\Users\Admin\AppData\Local\Temp\tmp240642046.exe47⤵PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642062.exeC:\Users\Admin\AppData\Local\Temp\tmp240642062.exe47⤵PID:4336
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641625.exeC:\Users\Admin\AppData\Local\Temp\tmp240641625.exe42⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\tmp240641671.exeC:\Users\Admin\AppData\Local\Temp\tmp240641671.exe43⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641687.exeC:\Users\Admin\AppData\Local\Temp\tmp240641687.exe43⤵PID:4820
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641234.exeC:\Users\Admin\AppData\Local\Temp\tmp240641234.exe38⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\tmp240641312.exeC:\Users\Admin\AppData\Local\Temp\tmp240641312.exe39⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641343.exeC:\Users\Admin\AppData\Local\Temp\tmp240641343.exe39⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\tmp240641406.exeC:\Users\Admin\AppData\Local\Temp\tmp240641406.exe40⤵PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641421.exeC:\Users\Admin\AppData\Local\Temp\tmp240641421.exe40⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\tmp240641453.exeC:\Users\Admin\AppData\Local\Temp\tmp240641453.exe41⤵
- Checks computer location settings
- Modifies registry class
PID:4704 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\tmp240641656.exeC:\Users\Admin\AppData\Local\Temp\tmp240641656.exe43⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641718.exeC:\Users\Admin\AppData\Local\Temp\tmp240641718.exe43⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\tmp240641750.exeC:\Users\Admin\AppData\Local\Temp\tmp240641750.exe44⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641765.exeC:\Users\Admin\AppData\Local\Temp\tmp240641765.exe44⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\tmp240641796.exeC:\Users\Admin\AppData\Local\Temp\tmp240641796.exe45⤵PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641812.exeC:\Users\Admin\AppData\Local\Temp\tmp240641812.exe45⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\tmp240641859.exeC:\Users\Admin\AppData\Local\Temp\tmp240641859.exe46⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5048 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\tmp240642031.exeC:\Users\Admin\AppData\Local\Temp\tmp240642031.exe48⤵
- Checks computer location settings
- Modifies registry class
PID:1920 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\tmp240642187.exeC:\Users\Admin\AppData\Local\Temp\tmp240642187.exe50⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642218.exeC:\Users\Admin\AppData\Local\Temp\tmp240642218.exe50⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\tmp240642312.exeC:\Users\Admin\AppData\Local\Temp\tmp240642312.exe51⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642375.exeC:\Users\Admin\AppData\Local\Temp\tmp240642375.exe51⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\tmp240642484.exeC:\Users\Admin\AppData\Local\Temp\tmp240642484.exe52⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642531.exeC:\Users\Admin\AppData\Local\Temp\tmp240642531.exe52⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\tmp240642546.exeC:\Users\Admin\AppData\Local\Temp\tmp240642546.exe53⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\tmp240642687.exeC:\Users\Admin\AppData\Local\Temp\tmp240642687.exe55⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\tmp240642828.exeC:\Users\Admin\AppData\Local\Temp\tmp240642828.exe57⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642843.exeC:\Users\Admin\AppData\Local\Temp\tmp240642843.exe57⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\tmp240642937.exeC:\Users\Admin\AppData\Local\Temp\tmp240642937.exe58⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643046.exeC:\Users\Admin\AppData\Local\Temp\tmp240643046.exe58⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\tmp240643062.exeC:\Users\Admin\AppData\Local\Temp\tmp240643062.exe59⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643078.exeC:\Users\Admin\AppData\Local\Temp\tmp240643078.exe59⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\tmp240643109.exeC:\Users\Admin\AppData\Local\Temp\tmp240643109.exe60⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3576 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\tmp240643593.exeC:\Users\Admin\AppData\Local\Temp\tmp240643593.exe62⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643640.exeC:\Users\Admin\AppData\Local\Temp\tmp240643640.exe62⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\tmp240643750.exeC:\Users\Admin\AppData\Local\Temp\tmp240643750.exe63⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643781.exeC:\Users\Admin\AppData\Local\Temp\tmp240643781.exe63⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\tmp240643812.exeC:\Users\Admin\AppData\Local\Temp\tmp240643812.exe64⤵PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643828.exeC:\Users\Admin\AppData\Local\Temp\tmp240643828.exe64⤵PID:4628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643203.exeC:\Users\Admin\AppData\Local\Temp\tmp240643203.exe60⤵PID:5044
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642750.exeC:\Users\Admin\AppData\Local\Temp\tmp240642750.exe55⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\tmp240642781.exeC:\Users\Admin\AppData\Local\Temp\tmp240642781.exe56⤵PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642906.exeC:\Users\Admin\AppData\Local\Temp\tmp240642906.exe56⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\tmp240643000.exeC:\Users\Admin\AppData\Local\Temp\tmp240643000.exe57⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643140.exeC:\Users\Admin\AppData\Local\Temp\tmp240643140.exe57⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\tmp240643234.exeC:\Users\Admin\AppData\Local\Temp\tmp240643234.exe58⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643250.exeC:\Users\Admin\AppData\Local\Temp\tmp240643250.exe58⤵PID:3284
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642578.exeC:\Users\Admin\AppData\Local\Temp\tmp240642578.exe53⤵PID:3088
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642093.exeC:\Users\Admin\AppData\Local\Temp\tmp240642093.exe48⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\tmp240642140.exeC:\Users\Admin\AppData\Local\Temp\tmp240642140.exe49⤵PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642156.exeC:\Users\Admin\AppData\Local\Temp\tmp240642156.exe49⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\tmp240642203.exeC:\Users\Admin\AppData\Local\Temp\tmp240642203.exe50⤵
- Checks computer location settings
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\tmp240642328.exeC:\Users\Admin\AppData\Local\Temp\tmp240642328.exe52⤵PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642359.exeC:\Users\Admin\AppData\Local\Temp\tmp240642359.exe52⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\tmp240642406.exeC:\Users\Admin\AppData\Local\Temp\tmp240642406.exe53⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:544 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\tmp240642562.exeC:\Users\Admin\AppData\Local\Temp\tmp240642562.exe55⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642671.exeC:\Users\Admin\AppData\Local\Temp\tmp240642671.exe55⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\tmp240642703.exeC:\Users\Admin\AppData\Local\Temp\tmp240642703.exe56⤵PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642718.exeC:\Users\Admin\AppData\Local\Temp\tmp240642718.exe56⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\tmp240642812.exeC:\Users\Admin\AppData\Local\Temp\tmp240642812.exe57⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\tmp240642953.exeC:\Users\Admin\AppData\Local\Temp\tmp240642953.exe59⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1872 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"60⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\tmp240643171.exeC:\Users\Admin\AppData\Local\Temp\tmp240643171.exe61⤵PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643187.exeC:\Users\Admin\AppData\Local\Temp\tmp240643187.exe61⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\tmp240643218.exeC:\Users\Admin\AppData\Local\Temp\tmp240643218.exe62⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643546.exeC:\Users\Admin\AppData\Local\Temp\tmp240643546.exe62⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\tmp240643750.exeC:\Users\Admin\AppData\Local\Temp\tmp240643750.exe63⤵PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643781.exeC:\Users\Admin\AppData\Local\Temp\tmp240643781.exe63⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\tmp240643890.exeC:\Users\Admin\AppData\Local\Temp\tmp240643890.exe64⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643906.exeC:\Users\Admin\AppData\Local\Temp\tmp240643906.exe64⤵PID:1952
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643031.exeC:\Users\Admin\AppData\Local\Temp\tmp240643031.exe59⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\tmp240643328.exeC:\Users\Admin\AppData\Local\Temp\tmp240643328.exe60⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3052 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\tmp240643671.exeC:\Users\Admin\AppData\Local\Temp\tmp240643671.exe62⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\tmp240643796.exeC:\Users\Admin\AppData\Local\Temp\tmp240643796.exe64⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\tmp240643921.exeC:\Users\Admin\AppData\Local\Temp\tmp240643921.exe66⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1036 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\tmp240644281.exeC:\Users\Admin\AppData\Local\Temp\tmp240644281.exe68⤵
- Checks computer location settings
- Modifies registry class
PID:3568 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\tmp240644437.exeC:\Users\Admin\AppData\Local\Temp\tmp240644437.exe70⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644468.exeC:\Users\Admin\AppData\Local\Temp\tmp240644468.exe70⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\tmp240644796.exeC:\Users\Admin\AppData\Local\Temp\tmp240644796.exe71⤵PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644890.exeC:\Users\Admin\AppData\Local\Temp\tmp240644890.exe71⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\tmp240644953.exeC:\Users\Admin\AppData\Local\Temp\tmp240644953.exe72⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645625.exeC:\Users\Admin\AppData\Local\Temp\tmp240645625.exe72⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\tmp240646062.exeC:\Users\Admin\AppData\Local\Temp\tmp240646062.exe73⤵PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646156.exeC:\Users\Admin\AppData\Local\Temp\tmp240646156.exe73⤵PID:3748
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644328.exeC:\Users\Admin\AppData\Local\Temp\tmp240644328.exe68⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\tmp240644421.exeC:\Users\Admin\AppData\Local\Temp\tmp240644421.exe69⤵
- Checks computer location settings
- Modifies registry class
PID:940 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\tmp240644968.exeC:\Users\Admin\AppData\Local\Temp\tmp240644968.exe71⤵PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645203.exeC:\Users\Admin\AppData\Local\Temp\tmp240645203.exe71⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\tmp240645265.exeC:\Users\Admin\AppData\Local\Temp\tmp240645265.exe72⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645359.exeC:\Users\Admin\AppData\Local\Temp\tmp240645359.exe72⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\tmp240645406.exeC:\Users\Admin\AppData\Local\Temp\tmp240645406.exe73⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645640.exeC:\Users\Admin\AppData\Local\Temp\tmp240645640.exe73⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\tmp240645703.exeC:\Users\Admin\AppData\Local\Temp\tmp240645703.exe74⤵PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645718.exeC:\Users\Admin\AppData\Local\Temp\tmp240645718.exe74⤵PID:4816
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644578.exeC:\Users\Admin\AppData\Local\Temp\tmp240644578.exe69⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\tmp240644765.exeC:\Users\Admin\AppData\Local\Temp\tmp240644765.exe70⤵PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644781.exeC:\Users\Admin\AppData\Local\Temp\tmp240644781.exe70⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\tmp240645062.exeC:\Users\Admin\AppData\Local\Temp\tmp240645062.exe71⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645078.exeC:\Users\Admin\AppData\Local\Temp\tmp240645078.exe71⤵PID:3088
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643937.exeC:\Users\Admin\AppData\Local\Temp\tmp240643937.exe66⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\tmp240643968.exeC:\Users\Admin\AppData\Local\Temp\tmp240643968.exe67⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644000.exeC:\Users\Admin\AppData\Local\Temp\tmp240644000.exe67⤵PID:4280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644062.exeC:\Users\Admin\AppData\Local\Temp\tmp240644062.exe64⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\tmp240644078.exeC:\Users\Admin\AppData\Local\Temp\tmp240644078.exe65⤵PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644109.exeC:\Users\Admin\AppData\Local\Temp\tmp240644109.exe65⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\tmp240644140.exeC:\Users\Admin\AppData\Local\Temp\tmp240644140.exe66⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3884 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\tmp240644343.exeC:\Users\Admin\AppData\Local\Temp\tmp240644343.exe68⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644500.exeC:\Users\Admin\AppData\Local\Temp\tmp240644500.exe68⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\tmp240644515.exeC:\Users\Admin\AppData\Local\Temp\tmp240644515.exe69⤵PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644593.exeC:\Users\Admin\AppData\Local\Temp\tmp240644593.exe69⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\tmp240644656.exeC:\Users\Admin\AppData\Local\Temp\tmp240644656.exe70⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644671.exeC:\Users\Admin\AppData\Local\Temp\tmp240644671.exe70⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\tmp240644859.exeC:\Users\Admin\AppData\Local\Temp\tmp240644859.exe71⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644875.exeC:\Users\Admin\AppData\Local\Temp\tmp240644875.exe71⤵PID:4908
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644171.exeC:\Users\Admin\AppData\Local\Temp\tmp240644171.exe66⤵PID:3652
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643687.exeC:\Users\Admin\AppData\Local\Temp\tmp240643687.exe62⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\tmp240643843.exeC:\Users\Admin\AppData\Local\Temp\tmp240643843.exe63⤵PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643859.exeC:\Users\Admin\AppData\Local\Temp\tmp240643859.exe63⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\tmp240644031.exeC:\Users\Admin\AppData\Local\Temp\tmp240644031.exe64⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\tmp240644296.exeC:\Users\Admin\AppData\Local\Temp\tmp240644296.exe66⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644312.exeC:\Users\Admin\AppData\Local\Temp\tmp240644312.exe66⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\tmp240644359.exeC:\Users\Admin\AppData\Local\Temp\tmp240644359.exe67⤵PID:384
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644453.exeC:\Users\Admin\AppData\Local\Temp\tmp240644453.exe67⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\tmp240644609.exeC:\Users\Admin\AppData\Local\Temp\tmp240644609.exe68⤵
- Checks computer location settings
- Modifies registry class
PID:748 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\tmp240644843.exeC:\Users\Admin\AppData\Local\Temp\tmp240644843.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\tmp240645109.exeC:\Users\Admin\AppData\Local\Temp\tmp240645109.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4976 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\tmp240645312.exeC:\Users\Admin\AppData\Local\Temp\tmp240645312.exe74⤵
- Checks computer location settings
- Modifies registry class
PID:4680 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\tmp240645750.exeC:\Users\Admin\AppData\Local\Temp\tmp240645750.exe76⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645781.exeC:\Users\Admin\AppData\Local\Temp\tmp240645781.exe76⤵PID:3680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645421.exeC:\Users\Admin\AppData\Local\Temp\tmp240645421.exe74⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\tmp240645515.exeC:\Users\Admin\AppData\Local\Temp\tmp240645515.exe75⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645812.exeC:\Users\Admin\AppData\Local\Temp\tmp240645812.exe75⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\tmp240645906.exeC:\Users\Admin\AppData\Local\Temp\tmp240645906.exe76⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645921.exeC:\Users\Admin\AppData\Local\Temp\tmp240645921.exe76⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\tmp240645968.exeC:\Users\Admin\AppData\Local\Temp\tmp240645968.exe77⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646109.exeC:\Users\Admin\AppData\Local\Temp\tmp240646109.exe77⤵PID:3964
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645140.exeC:\Users\Admin\AppData\Local\Temp\tmp240645140.exe72⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\tmp240645171.exeC:\Users\Admin\AppData\Local\Temp\tmp240645171.exe73⤵PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645343.exeC:\Users\Admin\AppData\Local\Temp\tmp240645343.exe73⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\tmp240645453.exeC:\Users\Admin\AppData\Local\Temp\tmp240645453.exe74⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645468.exeC:\Users\Admin\AppData\Local\Temp\tmp240645468.exe74⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\tmp240645531.exeC:\Users\Admin\AppData\Local\Temp\tmp240645531.exe75⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645546.exeC:\Users\Admin\AppData\Local\Temp\tmp240645546.exe75⤵PID:3212
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644937.exeC:\Users\Admin\AppData\Local\Temp\tmp240644937.exe70⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\tmp240645015.exeC:\Users\Admin\AppData\Local\Temp\tmp240645015.exe71⤵PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645234.exeC:\Users\Admin\AppData\Local\Temp\tmp240645234.exe71⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\tmp240645281.exeC:\Users\Admin\AppData\Local\Temp\tmp240645281.exe72⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645328.exeC:\Users\Admin\AppData\Local\Temp\tmp240645328.exe72⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\tmp240645687.exeC:\Users\Admin\AppData\Local\Temp\tmp240645687.exe73⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\tmp240645890.exeC:\Users\Admin\AppData\Local\Temp\tmp240645890.exe75⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\tmp240646125.exeC:\Users\Admin\AppData\Local\Temp\tmp240646125.exe77⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:620 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\tmp240646281.exeC:\Users\Admin\AppData\Local\Temp\tmp240646281.exe79⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2632 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\tmp240646546.exeC:\Users\Admin\AppData\Local\Temp\tmp240646546.exe81⤵PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646593.exeC:\Users\Admin\AppData\Local\Temp\tmp240646593.exe81⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\tmp240646625.exeC:\Users\Admin\AppData\Local\Temp\tmp240646625.exe82⤵
- Checks computer location settings
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\tmp240646796.exeC:\Users\Admin\AppData\Local\Temp\tmp240646796.exe84⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646812.exeC:\Users\Admin\AppData\Local\Temp\tmp240646812.exe84⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\tmp240647000.exeC:\Users\Admin\AppData\Local\Temp\tmp240647000.exe85⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\tmp240647187.exeC:\Users\Admin\AppData\Local\Temp\tmp240647187.exe87⤵PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240647281.exeC:\Users\Admin\AppData\Local\Temp\tmp240647281.exe87⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\tmp240647437.exeC:\Users\Admin\AppData\Local\Temp\tmp240647437.exe88⤵
- Checks computer location settings
- Modifies registry class
PID:3688 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\tmp240647578.exeC:\Users\Admin\AppData\Local\Temp\tmp240647578.exe90⤵
- Checks computer location settings
- Modifies registry class
PID:5092 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\tmp240647765.exeC:\Users\Admin\AppData\Local\Temp\tmp240647765.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4364 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\tmp240648015.exeC:\Users\Admin\AppData\Local\Temp\tmp240648015.exe94⤵PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648156.exeC:\Users\Admin\AppData\Local\Temp\tmp240648156.exe94⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\tmp240648265.exeC:\Users\Admin\AppData\Local\Temp\tmp240648265.exe95⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3808 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\tmp240648500.exeC:\Users\Admin\AppData\Local\Temp\tmp240648500.exe97⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648656.exeC:\Users\Admin\AppData\Local\Temp\tmp240648656.exe97⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\tmp240648718.exeC:\Users\Admin\AppData\Local\Temp\tmp240648718.exe98⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648906.exeC:\Users\Admin\AppData\Local\Temp\tmp240648906.exe98⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\tmp240648953.exeC:\Users\Admin\AppData\Local\Temp\tmp240648953.exe99⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4280 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\tmp240649125.exeC:\Users\Admin\AppData\Local\Temp\tmp240649125.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:1060 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\tmp240649296.exeC:\Users\Admin\AppData\Local\Temp\tmp240649296.exe103⤵PID:4912
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\tmp240649406.exeC:\Users\Admin\AppData\Local\Temp\tmp240649406.exe105⤵PID:1492
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"106⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\tmp240649656.exeC:\Users\Admin\AppData\Local\Temp\tmp240649656.exe107⤵PID:4784
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\tmp240650000.exeC:\Users\Admin\AppData\Local\Temp\tmp240650000.exe109⤵PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650093.exeC:\Users\Admin\AppData\Local\Temp\tmp240650093.exe109⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\tmp240650390.exeC:\Users\Admin\AppData\Local\Temp\tmp240650390.exe110⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650421.exeC:\Users\Admin\AppData\Local\Temp\tmp240650421.exe110⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\tmp240650453.exeC:\Users\Admin\AppData\Local\Temp\tmp240650453.exe111⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650484.exeC:\Users\Admin\AppData\Local\Temp\tmp240650484.exe111⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\tmp240650593.exeC:\Users\Admin\AppData\Local\Temp\tmp240650593.exe112⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650640.exeC:\Users\Admin\AppData\Local\Temp\tmp240650640.exe112⤵PID:4620
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649671.exeC:\Users\Admin\AppData\Local\Temp\tmp240649671.exe107⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\tmp240649687.exeC:\Users\Admin\AppData\Local\Temp\tmp240649687.exe108⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649890.exeC:\Users\Admin\AppData\Local\Temp\tmp240649890.exe108⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\tmp240649937.exeC:\Users\Admin\AppData\Local\Temp\tmp240649937.exe109⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649968.exeC:\Users\Admin\AppData\Local\Temp\tmp240649968.exe109⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\tmp240650140.exeC:\Users\Admin\AppData\Local\Temp\tmp240650140.exe110⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650765.exeC:\Users\Admin\AppData\Local\Temp\tmp240650765.exe110⤵PID:4500
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649812.exeC:\Users\Admin\AppData\Local\Temp\tmp240649812.exe105⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\tmp240649953.exeC:\Users\Admin\AppData\Local\Temp\tmp240649953.exe106⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650203.exeC:\Users\Admin\AppData\Local\Temp\tmp240650203.exe106⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\tmp240650328.exeC:\Users\Admin\AppData\Local\Temp\tmp240650328.exe107⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650343.exeC:\Users\Admin\AppData\Local\Temp\tmp240650343.exe107⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\tmp240650562.exeC:\Users\Admin\AppData\Local\Temp\tmp240650562.exe108⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650578.exeC:\Users\Admin\AppData\Local\Temp\tmp240650578.exe108⤵PID:3632
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649500.exeC:\Users\Admin\AppData\Local\Temp\tmp240649500.exe103⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\tmp240649546.exeC:\Users\Admin\AppData\Local\Temp\tmp240649546.exe104⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649593.exeC:\Users\Admin\AppData\Local\Temp\tmp240649593.exe104⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\tmp240649765.exeC:\Users\Admin\AppData\Local\Temp\tmp240649765.exe105⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649781.exeC:\Users\Admin\AppData\Local\Temp\tmp240649781.exe105⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\tmp240649859.exeC:\Users\Admin\AppData\Local\Temp\tmp240649859.exe106⤵PID:3380
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\tmp240650031.exeC:\Users\Admin\AppData\Local\Temp\tmp240650031.exe108⤵PID:4024
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\tmp240650250.exeC:\Users\Admin\AppData\Local\Temp\tmp240650250.exe110⤵PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650265.exeC:\Users\Admin\AppData\Local\Temp\tmp240650265.exe110⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\tmp240650671.exeC:\Users\Admin\AppData\Local\Temp\tmp240650671.exe111⤵PID:4820
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\tmp240650875.exeC:\Users\Admin\AppData\Local\Temp\tmp240650875.exe113⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\tmp240650906.exeC:\Users\Admin\AppData\Local\Temp\tmp240650906.exe114⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651015.exeC:\Users\Admin\AppData\Local\Temp\tmp240651015.exe114⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\tmp240651046.exeC:\Users\Admin\AppData\Local\Temp\tmp240651046.exe115⤵PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651125.exeC:\Users\Admin\AppData\Local\Temp\tmp240651125.exe115⤵PID:4560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651140.exeC:\Users\Admin\AppData\Local\Temp\tmp240651140.exe113⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\tmp240651250.exeC:\Users\Admin\AppData\Local\Temp\tmp240651250.exe114⤵PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651359.exeC:\Users\Admin\AppData\Local\Temp\tmp240651359.exe114⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\tmp240651406.exeC:\Users\Admin\AppData\Local\Temp\tmp240651406.exe115⤵PID:816
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\tmp240651562.exeC:\Users\Admin\AppData\Local\Temp\tmp240651562.exe117⤵PID:3636
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\tmp240651734.exeC:\Users\Admin\AppData\Local\Temp\tmp240651734.exe119⤵PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651921.exeC:\Users\Admin\AppData\Local\Temp\tmp240651921.exe119⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\tmp240652015.exeC:\Users\Admin\AppData\Local\Temp\tmp240652015.exe120⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652125.exeC:\Users\Admin\AppData\Local\Temp\tmp240652125.exe120⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\tmp240652171.exeC:\Users\Admin\AppData\Local\Temp\tmp240652171.exe121⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652250.exeC:\Users\Admin\AppData\Local\Temp\tmp240652250.exe121⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\tmp240652312.exeC:\Users\Admin\AppData\Local\Temp\tmp240652312.exe122⤵PID:4000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-