Analysis
-
max time kernel
20s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 11:49
Static task
static1
Behavioral task
behavioral1
Sample
6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
6779ce241ef42c0d4fa5a0f696d33e92
-
SHA1
4ab56181194100b613c01303c8bd2a500ace7e69
-
SHA256
ef0f82b472aab1edf99b46c71976a7d823d3e9c903e45e0a79f770c57fc61160
-
SHA512
7e70bfa3a4925a6a88192201a2a9258586f7878d9e7802087e18b8659541b77c2e802e3615075ac8c59a1ba45b3376b8243e0d91a52889e8e85ce056304bb9c1
-
SSDEEP
12288:bdPqPFdPZdPrPFdPZdPiPFdPZdPFPFbSDyTFtj6PHdPZdPfPFdPZdPwPFdPZdPNe:UDyTFtjYDyTFtjODyo1tj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 45 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240621921.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240622140.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240623843.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240626296.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240628703.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240630375.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240634625.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240634906.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240636546.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240626046.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240627500.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240629703.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240631015.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240631796.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240632953.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240629171.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240632406.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240632640.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240636000.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240636250.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240625750.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240626515.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240627218.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240628906.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240629500.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240631421.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240635312.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240620062.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240623000.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240624250.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240630843.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240632187.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240633984.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240634281.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240635687.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240620734.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240627750.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240628390.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240633656.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240621343.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240626843.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240628031.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240630000.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation tmp240633312.exe -
Executes dropped EXE 64 IoCs
pid Process 4312 notpad.exe 4624 tmp240620062.exe 3188 tmp240620140.exe 212 notpad.exe 2736 tmp240620734.exe 772 tmp240620796.exe 4212 notpad.exe 820 tmp240621343.exe 2164 tmp240621437.exe 3384 notpad.exe 2260 tmp240621921.exe 2052 tmp240621984.exe 4488 notpad.exe 3580 tmp240622140.exe 1940 tmp240622187.exe 1280 notpad.exe 3668 tmp240623000.exe 964 tmp240623046.exe 1600 tmp240623140.exe 392 tmp240623187.exe 4492 notpad.exe 4132 tmp240623843.exe 2696 tmp240623921.exe 452 tmp240624062.exe 4932 notpad.exe 560 tmp240624093.exe 2360 tmp240624250.exe 1584 tmp240624343.exe 3080 tmp240624312.exe 4780 tmp240624406.exe 1824 tmp240624484.exe 3636 tmp240625546.exe 4324 tmp240625640.exe 4404 tmp240625703.exe 3996 notpad.exe 436 tmp240625750.exe 4020 tmp240625781.exe 4884 tmp240625843.exe 2548 tmp240625937.exe 3876 tmp240626000.exe 3308 tmp240626015.exe 820 notpad.exe 3928 tmp240626046.exe 2836 tmp240626078.exe 2784 tmp240626156.exe 1204 notpad.exe 4488 tmp240626171.exe 1228 tmp240626296.exe 336 tmp240626312.exe 640 tmp240626328.exe 4124 tmp240626343.exe 1696 tmp240626421.exe 776 tmp240626453.exe 392 notpad.exe 1880 tmp240626515.exe 712 tmp240626546.exe 3668 tmp240626562.exe 1056 tmp240626578.exe 1932 tmp240626703.exe 452 tmp240626750.exe 4604 notpad.exe 2844 tmp240626843.exe 1668 tmp240626828.exe 4308 tmp240626859.exe -
resource yara_rule behavioral2/files/0x0007000000023456-11.dat upx behavioral2/memory/4312-21-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4312-42-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00090000000233f7-28.dat upx behavioral2/memory/212-44-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/212-65-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4212-87-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3384-109-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4488-116-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4488-122-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000023468-142.dat upx behavioral2/memory/1280-144-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1280-164-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/964-157-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/964-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000002346d-184.dat upx behavioral2/memory/4492-186-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2696-210-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/560-257-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4932-255-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3080-249-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2696-234-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3080-264-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3996-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4020-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4020-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2836-333-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/776-385-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4604-403-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1056-401-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/100-480-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4348-525-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1368-528-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2504-552-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1880-579-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4844-618-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4484-646-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/100-670-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/440-676-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1416-715-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1904-726-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1904-765-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2140-766-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/896-763-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/324-753-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/712-751-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1416-733-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4488-723-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2704-714-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/712-710-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/440-702-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2704-696-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3480-690-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4488-681-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3480-671-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/100-659-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4484-658-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2548-639-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4844-631-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4948-617-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1900-605-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4948-604-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2408-602-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1900-588-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe- tmp240626515.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240626843.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240627500.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240633312.exe File created C:\Windows\SysWOW64\notpad.exe tmp240636828.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240621343.exe File created C:\Windows\SysWOW64\notpad.exe tmp240623843.exe File created C:\Windows\SysWOW64\notpad.exe tmp240626046.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240630000.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240633984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240636828.exe File created C:\Windows\SysWOW64\notpad.exe tmp240620062.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240627750.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240629500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240626296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240621921.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240631796.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240632187.exe File created C:\Windows\SysWOW64\notpad.exe- 6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240629500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240634906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240636000.exe File created C:\Windows\SysWOW64\notpad.exe tmp240636546.exe File created C:\Windows\SysWOW64\notpad.exe tmp240629171.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240627750.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240632953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240626046.exe File created C:\Windows\SysWOW64\notpad.exe tmp240629500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240630843.exe File created C:\Windows\SysWOW64\notpad.exe tmp240631015.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240626296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240621343.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240626296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240630375.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240620062.exe File created C:\Windows\SysWOW64\notpad.exe tmp240633656.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240634906.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240636546.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240628390.exe File created C:\Windows\SysWOW64\notpad.exe tmp240628390.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240628703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240628906.exe File created C:\Windows\SysWOW64\notpad.exe tmp240634625.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240636250.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240636828.exe File created C:\Windows\SysWOW64\notpad.exe tmp240628031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240631421.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240632953.exe File created C:\Windows\SysWOW64\notpad.exe tmp240633984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240622140.exe File created C:\Windows\SysWOW64\notpad.exe tmp240624250.exe File created C:\Windows\SysWOW64\notpad.exe tmp240626843.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240627218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240631421.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240633656.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240624250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240632640.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240632640.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240633656.exe File created C:\Windows\SysWOW64\notpad.exe tmp240634281.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240624250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240623000.exe File created C:\Windows\SysWOW64\notpad.exe tmp240627750.exe File created C:\Windows\SysWOW64\notpad.exe tmp240635687.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240624250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240635687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240634625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240633984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240634906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240621921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240622140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240633656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240633312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240635312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" 6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240634281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240621343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628031.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4312 3080 6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe 87 PID 3080 wrote to memory of 4312 3080 6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe 87 PID 3080 wrote to memory of 4312 3080 6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe 87 PID 4312 wrote to memory of 4624 4312 notpad.exe 252 PID 4312 wrote to memory of 4624 4312 notpad.exe 252 PID 4312 wrote to memory of 4624 4312 notpad.exe 252 PID 4312 wrote to memory of 3188 4312 notpad.exe 156 PID 4312 wrote to memory of 3188 4312 notpad.exe 156 PID 4312 wrote to memory of 3188 4312 notpad.exe 156 PID 4624 wrote to memory of 212 4624 tmp240620062.exe 468 PID 4624 wrote to memory of 212 4624 tmp240620062.exe 468 PID 4624 wrote to memory of 212 4624 tmp240620062.exe 468 PID 212 wrote to memory of 2736 212 notpad.exe 1321 PID 212 wrote to memory of 2736 212 notpad.exe 1321 PID 212 wrote to memory of 2736 212 notpad.exe 1321 PID 212 wrote to memory of 772 212 notpad.exe 1305 PID 212 wrote to memory of 772 212 notpad.exe 1305 PID 212 wrote to memory of 772 212 notpad.exe 1305 PID 2736 wrote to memory of 4212 2736 tmp240620734.exe 1229 PID 2736 wrote to memory of 4212 2736 tmp240620734.exe 1229 PID 2736 wrote to memory of 4212 2736 tmp240620734.exe 1229 PID 4212 wrote to memory of 820 4212 notpad.exe 858 PID 4212 wrote to memory of 820 4212 notpad.exe 858 PID 4212 wrote to memory of 820 4212 notpad.exe 858 PID 4212 wrote to memory of 2164 4212 notpad.exe 435 PID 4212 wrote to memory of 2164 4212 notpad.exe 435 PID 4212 wrote to memory of 2164 4212 notpad.exe 435 PID 820 wrote to memory of 3384 820 tmp240621343.exe 96 PID 820 wrote to memory of 3384 820 tmp240621343.exe 96 PID 820 wrote to memory of 3384 820 tmp240621343.exe 96 PID 3384 wrote to memory of 2260 3384 notpad.exe 713 PID 3384 wrote to memory of 2260 3384 notpad.exe 713 PID 3384 wrote to memory of 2260 3384 notpad.exe 713 PID 3384 wrote to memory of 2052 3384 notpad.exe 200 PID 3384 wrote to memory of 2052 3384 notpad.exe 200 PID 3384 wrote to memory of 2052 3384 notpad.exe 200 PID 2260 wrote to memory of 4488 2260 tmp240621921.exe 1676 PID 2260 wrote to memory of 4488 2260 tmp240621921.exe 1676 PID 2260 wrote to memory of 4488 2260 tmp240621921.exe 1676 PID 4488 wrote to memory of 3580 4488 notpad.exe 1571 PID 4488 wrote to memory of 3580 4488 notpad.exe 1571 PID 4488 wrote to memory of 3580 4488 notpad.exe 1571 PID 4488 wrote to memory of 1940 4488 notpad.exe 390 PID 4488 wrote to memory of 1940 4488 notpad.exe 390 PID 4488 wrote to memory of 1940 4488 notpad.exe 390 PID 3580 wrote to memory of 1280 3580 tmp240622140.exe 102 PID 3580 wrote to memory of 1280 3580 tmp240622140.exe 102 PID 3580 wrote to memory of 1280 3580 tmp240622140.exe 102 PID 1280 wrote to memory of 3668 1280 notpad.exe 145 PID 1280 wrote to memory of 3668 1280 notpad.exe 145 PID 1280 wrote to memory of 3668 1280 notpad.exe 145 PID 1280 wrote to memory of 964 1280 notpad.exe 511 PID 1280 wrote to memory of 964 1280 notpad.exe 511 PID 1280 wrote to memory of 964 1280 notpad.exe 511 PID 964 wrote to memory of 1600 964 tmp240623046.exe 1454 PID 964 wrote to memory of 1600 964 tmp240623046.exe 1454 PID 964 wrote to memory of 1600 964 tmp240623046.exe 1454 PID 964 wrote to memory of 392 964 tmp240623046.exe 1787 PID 964 wrote to memory of 392 964 tmp240623046.exe 1787 PID 964 wrote to memory of 392 964 tmp240623046.exe 1787 PID 3668 wrote to memory of 4492 3668 tmp240623000.exe 1576 PID 3668 wrote to memory of 4492 3668 tmp240623000.exe 1576 PID 3668 wrote to memory of 4492 3668 tmp240623000.exe 1576 PID 4492 wrote to memory of 4132 4492 notpad.exe 1916
Processes
-
C:\Users\Admin\AppData\Local\Temp\6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6779ce241ef42c0d4fa5a0f696d33e92_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\tmp240620062.exeC:\Users\Admin\AppData\Local\Temp\tmp240620062.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\tmp240620734.exeC:\Users\Admin\AppData\Local\Temp\tmp240620734.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\tmp240621343.exeC:\Users\Admin\AppData\Local\Temp\tmp240621343.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\tmp240621921.exeC:\Users\Admin\AppData\Local\Temp\tmp240621921.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\tmp240622140.exeC:\Users\Admin\AppData\Local\Temp\tmp240622140.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\tmp240623000.exeC:\Users\Admin\AppData\Local\Temp\tmp240623000.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\tmp240623843.exeC:\Users\Admin\AppData\Local\Temp\tmp240623843.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4132 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\tmp240624250.exeC:\Users\Admin\AppData\Local\Temp\tmp240624250.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\tmp240625750.exeC:\Users\Admin\AppData\Local\Temp\tmp240625750.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:436 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\Temp\tmp240626046.exeC:\Users\Admin\AppData\Local\Temp\tmp240626046.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3928 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\tmp240626296.exeC:\Users\Admin\AppData\Local\Temp\tmp240626296.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1228 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:392 -
C:\Users\Admin\AppData\Local\Temp\tmp240626546.exeC:\Users\Admin\AppData\Local\Temp\tmp240626546.exe25⤵
- Executes dropped EXE
PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240626578.exeC:\Users\Admin\AppData\Local\Temp\tmp240626578.exe25⤵
- Executes dropped EXE
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\tmp240626703.exeC:\Users\Admin\AppData\Local\Temp\tmp240626703.exe26⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240626750.exeC:\Users\Admin\AppData\Local\Temp\tmp240626750.exe26⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\tmp240626843.exeC:\Users\Admin\AppData\Local\Temp\tmp240626843.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\tmp240627218.exeC:\Users\Admin\AppData\Local\Temp\tmp240627218.exe29⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\tmp240627500.exeC:\Users\Admin\AppData\Local\Temp\tmp240627500.exe31⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\tmp240627750.exeC:\Users\Admin\AppData\Local\Temp\tmp240627750.exe33⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:744 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\tmp240628031.exeC:\Users\Admin\AppData\Local\Temp\tmp240628031.exe35⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\tmp240628296.exeC:\Users\Admin\AppData\Local\Temp\tmp240628296.exe37⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240628312.exeC:\Users\Admin\AppData\Local\Temp\tmp240628312.exe37⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\tmp240628390.exeC:\Users\Admin\AppData\Local\Temp\tmp240628390.exe38⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\tmp240628703.exeC:\Users\Admin\AppData\Local\Temp\tmp240628703.exe40⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2052 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\tmp240628906.exeC:\Users\Admin\AppData\Local\Temp\tmp240628906.exe42⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\tmp240629171.exeC:\Users\Admin\AppData\Local\Temp\tmp240629171.exe44⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:548 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\tmp240629468.exeC:\Users\Admin\AppData\Local\Temp\tmp240629468.exe46⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629484.exeC:\Users\Admin\AppData\Local\Temp\tmp240629484.exe46⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\tmp240629640.exeC:\Users\Admin\AppData\Local\Temp\tmp240629640.exe47⤵PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629656.exeC:\Users\Admin\AppData\Local\Temp\tmp240629656.exe47⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\tmp240629703.exeC:\Users\Admin\AppData\Local\Temp\tmp240629703.exe48⤵
- Checks computer location settings
- Modifies registry class
PID:4288 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\tmp240630203.exeC:\Users\Admin\AppData\Local\Temp\tmp240630203.exe50⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630250.exeC:\Users\Admin\AppData\Local\Temp\tmp240630250.exe50⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\tmp240630375.exeC:\Users\Admin\AppData\Local\Temp\tmp240630375.exe51⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4932 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\tmp240630859.exeC:\Users\Admin\AppData\Local\Temp\tmp240630859.exe53⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630875.exeC:\Users\Admin\AppData\Local\Temp\tmp240630875.exe53⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\tmp240630968.exeC:\Users\Admin\AppData\Local\Temp\tmp240630968.exe54⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630984.exeC:\Users\Admin\AppData\Local\Temp\tmp240630984.exe54⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\tmp240631109.exeC:\Users\Admin\AppData\Local\Temp\tmp240631109.exe55⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631140.exeC:\Users\Admin\AppData\Local\Temp\tmp240631140.exe55⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\tmp240631250.exeC:\Users\Admin\AppData\Local\Temp\tmp240631250.exe56⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631265.exeC:\Users\Admin\AppData\Local\Temp\tmp240631265.exe56⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\tmp240631312.exeC:\Users\Admin\AppData\Local\Temp\tmp240631312.exe57⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631328.exeC:\Users\Admin\AppData\Local\Temp\tmp240631328.exe57⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\tmp240631421.exeC:\Users\Admin\AppData\Local\Temp\tmp240631421.exe58⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3272 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\tmp240631796.exeC:\Users\Admin\AppData\Local\Temp\tmp240631796.exe60⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\tmp240632125.exeC:\Users\Admin\AppData\Local\Temp\tmp240632125.exe62⤵PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632156.exeC:\Users\Admin\AppData\Local\Temp\tmp240632156.exe62⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\tmp240632296.exeC:\Users\Admin\AppData\Local\Temp\tmp240632296.exe63⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632343.exeC:\Users\Admin\AppData\Local\Temp\tmp240632343.exe63⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\tmp240632406.exeC:\Users\Admin\AppData\Local\Temp\tmp240632406.exe64⤵
- Checks computer location settings
- Modifies registry class
PID:700 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\tmp240632671.exeC:\Users\Admin\AppData\Local\Temp\tmp240632671.exe66⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632687.exeC:\Users\Admin\AppData\Local\Temp\tmp240632687.exe66⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\tmp240632843.exeC:\Users\Admin\AppData\Local\Temp\tmp240632843.exe67⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632890.exeC:\Users\Admin\AppData\Local\Temp\tmp240632890.exe67⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\tmp240632968.exeC:\Users\Admin\AppData\Local\Temp\tmp240632968.exe68⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633015.exeC:\Users\Admin\AppData\Local\Temp\tmp240633015.exe68⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\tmp240633078.exeC:\Users\Admin\AppData\Local\Temp\tmp240633078.exe69⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633140.exeC:\Users\Admin\AppData\Local\Temp\tmp240633140.exe69⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\tmp240633234.exeC:\Users\Admin\AppData\Local\Temp\tmp240633234.exe70⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633296.exeC:\Users\Admin\AppData\Local\Temp\tmp240633296.exe70⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\tmp240633343.exeC:\Users\Admin\AppData\Local\Temp\tmp240633343.exe71⤵PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633359.exeC:\Users\Admin\AppData\Local\Temp\tmp240633359.exe71⤵PID:3276
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632468.exeC:\Users\Admin\AppData\Local\Temp\tmp240632468.exe64⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\tmp240632515.exeC:\Users\Admin\AppData\Local\Temp\tmp240632515.exe65⤵PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632531.exeC:\Users\Admin\AppData\Local\Temp\tmp240632531.exe65⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\tmp240632562.exeC:\Users\Admin\AppData\Local\Temp\tmp240632562.exe66⤵PID:600
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632578.exeC:\Users\Admin\AppData\Local\Temp\tmp240632578.exe66⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\tmp240632718.exeC:\Users\Admin\AppData\Local\Temp\tmp240632718.exe67⤵PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632781.exeC:\Users\Admin\AppData\Local\Temp\tmp240632781.exe67⤵PID:4244
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631843.exeC:\Users\Admin\AppData\Local\Temp\tmp240631843.exe60⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\tmp240631937.exeC:\Users\Admin\AppData\Local\Temp\tmp240631937.exe61⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631968.exeC:\Users\Admin\AppData\Local\Temp\tmp240631968.exe61⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\tmp240632031.exeC:\Users\Admin\AppData\Local\Temp\tmp240632031.exe62⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632046.exeC:\Users\Admin\AppData\Local\Temp\tmp240632046.exe62⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\tmp240632109.exeC:\Users\Admin\AppData\Local\Temp\tmp240632109.exe63⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632140.exeC:\Users\Admin\AppData\Local\Temp\tmp240632140.exe63⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\tmp240632187.exeC:\Users\Admin\AppData\Local\Temp\tmp240632187.exe64⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\tmp240632453.exeC:\Users\Admin\AppData\Local\Temp\tmp240632453.exe66⤵PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632546.exeC:\Users\Admin\AppData\Local\Temp\tmp240632546.exe66⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\tmp240632640.exeC:\Users\Admin\AppData\Local\Temp\tmp240632640.exe67⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp240633031.exeC:\Users\Admin\AppData\Local\Temp\tmp240633031.exe69⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633093.exeC:\Users\Admin\AppData\Local\Temp\tmp240633093.exe69⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\tmp240633187.exeC:\Users\Admin\AppData\Local\Temp\tmp240633187.exe70⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633203.exeC:\Users\Admin\AppData\Local\Temp\tmp240633203.exe70⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\tmp240633312.exeC:\Users\Admin\AppData\Local\Temp\tmp240633312.exe71⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\tmp240633671.exeC:\Users\Admin\AppData\Local\Temp\tmp240633671.exe73⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633687.exeC:\Users\Admin\AppData\Local\Temp\tmp240633687.exe73⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\tmp240633828.exeC:\Users\Admin\AppData\Local\Temp\tmp240633828.exe74⤵PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633890.exeC:\Users\Admin\AppData\Local\Temp\tmp240633890.exe74⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\tmp240634000.exeC:\Users\Admin\AppData\Local\Temp\tmp240634000.exe75⤵PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634015.exeC:\Users\Admin\AppData\Local\Temp\tmp240634015.exe75⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\tmp240634093.exeC:\Users\Admin\AppData\Local\Temp\tmp240634093.exe76⤵PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634125.exeC:\Users\Admin\AppData\Local\Temp\tmp240634125.exe76⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\tmp240634203.exeC:\Users\Admin\AppData\Local\Temp\tmp240634203.exe77⤵PID:3576
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634265.exeC:\Users\Admin\AppData\Local\Temp\tmp240634265.exe77⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\tmp240634328.exeC:\Users\Admin\AppData\Local\Temp\tmp240634328.exe78⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634343.exeC:\Users\Admin\AppData\Local\Temp\tmp240634343.exe78⤵PID:2700
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633390.exeC:\Users\Admin\AppData\Local\Temp\tmp240633390.exe71⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\tmp240633484.exeC:\Users\Admin\AppData\Local\Temp\tmp240633484.exe72⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633500.exeC:\Users\Admin\AppData\Local\Temp\tmp240633500.exe72⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\tmp240633593.exeC:\Users\Admin\AppData\Local\Temp\tmp240633593.exe73⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633625.exeC:\Users\Admin\AppData\Local\Temp\tmp240633625.exe73⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\tmp240633656.exeC:\Users\Admin\AppData\Local\Temp\tmp240633656.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2520 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\tmp240634062.exeC:\Users\Admin\AppData\Local\Temp\tmp240634062.exe76⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634078.exeC:\Users\Admin\AppData\Local\Temp\tmp240634078.exe76⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\tmp240634234.exeC:\Users\Admin\AppData\Local\Temp\tmp240634234.exe77⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634250.exeC:\Users\Admin\AppData\Local\Temp\tmp240634250.exe77⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\tmp240634375.exeC:\Users\Admin\AppData\Local\Temp\tmp240634375.exe78⤵PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634406.exeC:\Users\Admin\AppData\Local\Temp\tmp240634406.exe78⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\tmp240634500.exeC:\Users\Admin\AppData\Local\Temp\tmp240634500.exe79⤵PID:3508
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634515.exeC:\Users\Admin\AppData\Local\Temp\tmp240634515.exe79⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\tmp240634562.exeC:\Users\Admin\AppData\Local\Temp\tmp240634562.exe80⤵PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634578.exeC:\Users\Admin\AppData\Local\Temp\tmp240634578.exe80⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\tmp240634640.exeC:\Users\Admin\AppData\Local\Temp\tmp240634640.exe81⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634765.exeC:\Users\Admin\AppData\Local\Temp\tmp240634765.exe81⤵PID:2236
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633703.exeC:\Users\Admin\AppData\Local\Temp\tmp240633703.exe74⤵PID:4488
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632656.exeC:\Users\Admin\AppData\Local\Temp\tmp240632656.exe67⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\tmp240632734.exeC:\Users\Admin\AppData\Local\Temp\tmp240632734.exe68⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632812.exeC:\Users\Admin\AppData\Local\Temp\tmp240632812.exe68⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\tmp240632875.exeC:\Users\Admin\AppData\Local\Temp\tmp240632875.exe69⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632906.exeC:\Users\Admin\AppData\Local\Temp\tmp240632906.exe69⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\tmp240632953.exeC:\Users\Admin\AppData\Local\Temp\tmp240632953.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:540 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\tmp240633375.exeC:\Users\Admin\AppData\Local\Temp\tmp240633375.exe72⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633468.exeC:\Users\Admin\AppData\Local\Temp\tmp240633468.exe72⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\tmp240633562.exeC:\Users\Admin\AppData\Local\Temp\tmp240633562.exe73⤵PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633578.exeC:\Users\Admin\AppData\Local\Temp\tmp240633578.exe73⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\tmp240633718.exeC:\Users\Admin\AppData\Local\Temp\tmp240633718.exe74⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633750.exeC:\Users\Admin\AppData\Local\Temp\tmp240633750.exe74⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\tmp240633843.exeC:\Users\Admin\AppData\Local\Temp\tmp240633843.exe75⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633859.exeC:\Users\Admin\AppData\Local\Temp\tmp240633859.exe75⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\tmp240633921.exeC:\Users\Admin\AppData\Local\Temp\tmp240633921.exe76⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633937.exeC:\Users\Admin\AppData\Local\Temp\tmp240633937.exe76⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\tmp240633984.exeC:\Users\Admin\AppData\Local\Temp\tmp240633984.exe77⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\tmp240634281.exeC:\Users\Admin\AppData\Local\Temp\tmp240634281.exe79⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2308 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\tmp240634656.exeC:\Users\Admin\AppData\Local\Temp\tmp240634656.exe81⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634671.exeC:\Users\Admin\AppData\Local\Temp\tmp240634671.exe81⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\tmp240634796.exeC:\Users\Admin\AppData\Local\Temp\tmp240634796.exe82⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634843.exeC:\Users\Admin\AppData\Local\Temp\tmp240634843.exe82⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\tmp240635093.exeC:\Users\Admin\AppData\Local\Temp\tmp240635093.exe83⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635109.exeC:\Users\Admin\AppData\Local\Temp\tmp240635109.exe83⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\tmp240635250.exeC:\Users\Admin\AppData\Local\Temp\tmp240635250.exe84⤵PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635265.exeC:\Users\Admin\AppData\Local\Temp\tmp240635265.exe84⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\tmp240635312.exeC:\Users\Admin\AppData\Local\Temp\tmp240635312.exe85⤵
- Checks computer location settings
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\tmp240635687.exeC:\Users\Admin\AppData\Local\Temp\tmp240635687.exe87⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4492 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\tmp240636000.exeC:\Users\Admin\AppData\Local\Temp\tmp240636000.exe89⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:744 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\tmp240636234.exeC:\Users\Admin\AppData\Local\Temp\tmp240636234.exe91⤵PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636265.exeC:\Users\Admin\AppData\Local\Temp\tmp240636265.exe91⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\tmp240636375.exeC:\Users\Admin\AppData\Local\Temp\tmp240636375.exe92⤵PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636390.exeC:\Users\Admin\AppData\Local\Temp\tmp240636390.exe92⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\tmp240636468.exeC:\Users\Admin\AppData\Local\Temp\tmp240636468.exe93⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636531.exeC:\Users\Admin\AppData\Local\Temp\tmp240636531.exe93⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\tmp240636640.exeC:\Users\Admin\AppData\Local\Temp\tmp240636640.exe94⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636703.exeC:\Users\Admin\AppData\Local\Temp\tmp240636703.exe94⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\tmp240636750.exeC:\Users\Admin\AppData\Local\Temp\tmp240636750.exe95⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636765.exeC:\Users\Admin\AppData\Local\Temp\tmp240636765.exe95⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\tmp240636828.exeC:\Users\Admin\AppData\Local\Temp\tmp240636828.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:4056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\tmp240637046.exeC:\Users\Admin\AppData\Local\Temp\tmp240637046.exe98⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637062.exeC:\Users\Admin\AppData\Local\Temp\tmp240637062.exe98⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\tmp240637156.exeC:\Users\Admin\AppData\Local\Temp\tmp240637156.exe99⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637203.exeC:\Users\Admin\AppData\Local\Temp\tmp240637203.exe99⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\tmp240637343.exeC:\Users\Admin\AppData\Local\Temp\tmp240637343.exe100⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637359.exeC:\Users\Admin\AppData\Local\Temp\tmp240637359.exe100⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\tmp240637421.exeC:\Users\Admin\AppData\Local\Temp\tmp240637421.exe101⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637437.exeC:\Users\Admin\AppData\Local\Temp\tmp240637437.exe101⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\tmp240637484.exeC:\Users\Admin\AppData\Local\Temp\tmp240637484.exe102⤵PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637500.exeC:\Users\Admin\AppData\Local\Temp\tmp240637500.exe102⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\tmp240637562.exeC:\Users\Admin\AppData\Local\Temp\tmp240637562.exe103⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637593.exeC:\Users\Admin\AppData\Local\Temp\tmp240637593.exe103⤵PID:2592
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636859.exeC:\Users\Admin\AppData\Local\Temp\tmp240636859.exe96⤵PID:564
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636015.exeC:\Users\Admin\AppData\Local\Temp\tmp240636015.exe89⤵PID:3296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635781.exeC:\Users\Admin\AppData\Local\Temp\tmp240635781.exe87⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\tmp240635906.exeC:\Users\Admin\AppData\Local\Temp\tmp240635906.exe88⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635953.exeC:\Users\Admin\AppData\Local\Temp\tmp240635953.exe88⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\tmp240636078.exeC:\Users\Admin\AppData\Local\Temp\tmp240636078.exe89⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636109.exeC:\Users\Admin\AppData\Local\Temp\tmp240636109.exe89⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\tmp240636250.exeC:\Users\Admin\AppData\Local\Temp\tmp240636250.exe90⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\tmp240636546.exeC:\Users\Admin\AppData\Local\Temp\tmp240636546.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4420 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\tmp240636843.exeC:\Users\Admin\AppData\Local\Temp\tmp240636843.exe94⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636875.exeC:\Users\Admin\AppData\Local\Temp\tmp240636875.exe94⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\tmp240636984.exeC:\Users\Admin\AppData\Local\Temp\tmp240636984.exe95⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637031.exeC:\Users\Admin\AppData\Local\Temp\tmp240637031.exe95⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\tmp240637093.exeC:\Users\Admin\AppData\Local\Temp\tmp240637093.exe96⤵PID:4828
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\tmp240637453.exeC:\Users\Admin\AppData\Local\Temp\tmp240637453.exe98⤵PID:3208
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\tmp240637703.exeC:\Users\Admin\AppData\Local\Temp\tmp240637703.exe100⤵PID:1416
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\tmp240637921.exeC:\Users\Admin\AppData\Local\Temp\tmp240637921.exe102⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638000.exeC:\Users\Admin\AppData\Local\Temp\tmp240638000.exe102⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\tmp240638093.exeC:\Users\Admin\AppData\Local\Temp\tmp240638093.exe103⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638109.exeC:\Users\Admin\AppData\Local\Temp\tmp240638109.exe103⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\tmp240638218.exeC:\Users\Admin\AppData\Local\Temp\tmp240638218.exe104⤵PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638234.exeC:\Users\Admin\AppData\Local\Temp\tmp240638234.exe104⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\tmp240638328.exeC:\Users\Admin\AppData\Local\Temp\tmp240638328.exe105⤵PID:896
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"106⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\tmp240638734.exeC:\Users\Admin\AppData\Local\Temp\tmp240638734.exe107⤵PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638750.exeC:\Users\Admin\AppData\Local\Temp\tmp240638750.exe107⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\tmp240638953.exeC:\Users\Admin\AppData\Local\Temp\tmp240638953.exe108⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639000.exeC:\Users\Admin\AppData\Local\Temp\tmp240639000.exe108⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\tmp240639078.exeC:\Users\Admin\AppData\Local\Temp\tmp240639078.exe109⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639093.exeC:\Users\Admin\AppData\Local\Temp\tmp240639093.exe109⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\tmp240639203.exeC:\Users\Admin\AppData\Local\Temp\tmp240639203.exe110⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639234.exeC:\Users\Admin\AppData\Local\Temp\tmp240639234.exe110⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\tmp240639375.exeC:\Users\Admin\AppData\Local\Temp\tmp240639375.exe111⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639390.exeC:\Users\Admin\AppData\Local\Temp\tmp240639390.exe111⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\tmp240639437.exeC:\Users\Admin\AppData\Local\Temp\tmp240639437.exe112⤵PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639468.exeC:\Users\Admin\AppData\Local\Temp\tmp240639468.exe112⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\tmp240639593.exeC:\Users\Admin\AppData\Local\Temp\tmp240639593.exe113⤵PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639625.exeC:\Users\Admin\AppData\Local\Temp\tmp240639625.exe113⤵PID:540
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638468.exeC:\Users\Admin\AppData\Local\Temp\tmp240638468.exe105⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\tmp240638562.exeC:\Users\Admin\AppData\Local\Temp\tmp240638562.exe106⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638593.exeC:\Users\Admin\AppData\Local\Temp\tmp240638593.exe106⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\tmp240638765.exeC:\Users\Admin\AppData\Local\Temp\tmp240638765.exe107⤵PID:4940
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\tmp240639156.exeC:\Users\Admin\AppData\Local\Temp\tmp240639156.exe109⤵PID:2704
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"110⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\tmp240639546.exeC:\Users\Admin\AppData\Local\Temp\tmp240639546.exe111⤵PID:3296
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\tmp240640078.exeC:\Users\Admin\AppData\Local\Temp\tmp240640078.exe113⤵PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640140.exeC:\Users\Admin\AppData\Local\Temp\tmp240640140.exe113⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\tmp240640296.exeC:\Users\Admin\AppData\Local\Temp\tmp240640296.exe114⤵PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640328.exeC:\Users\Admin\AppData\Local\Temp\tmp240640328.exe114⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\tmp240640453.exeC:\Users\Admin\AppData\Local\Temp\tmp240640453.exe115⤵PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640593.exeC:\Users\Admin\AppData\Local\Temp\tmp240640593.exe115⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\tmp240640671.exeC:\Users\Admin\AppData\Local\Temp\tmp240640671.exe116⤵PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640734.exeC:\Users\Admin\AppData\Local\Temp\tmp240640734.exe116⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\tmp240640859.exeC:\Users\Admin\AppData\Local\Temp\tmp240640859.exe117⤵PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640921.exeC:\Users\Admin\AppData\Local\Temp\tmp240640921.exe117⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\tmp240641015.exeC:\Users\Admin\AppData\Local\Temp\tmp240641015.exe118⤵PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641062.exeC:\Users\Admin\AppData\Local\Temp\tmp240641062.exe118⤵PID:3580
-
C:\Users\Admin\AppData\Local\Temp\tmp240641140.exeC:\Users\Admin\AppData\Local\Temp\tmp240641140.exe119⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641562.exeC:\Users\Admin\AppData\Local\Temp\tmp240641562.exe119⤵PID:3488
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639609.exeC:\Users\Admin\AppData\Local\Temp\tmp240639609.exe111⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\tmp240639750.exeC:\Users\Admin\AppData\Local\Temp\tmp240639750.exe112⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639781.exeC:\Users\Admin\AppData\Local\Temp\tmp240639781.exe112⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\tmp240639875.exeC:\Users\Admin\AppData\Local\Temp\tmp240639875.exe113⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639921.exeC:\Users\Admin\AppData\Local\Temp\tmp240639921.exe113⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\tmp240640031.exeC:\Users\Admin\AppData\Local\Temp\tmp240640031.exe114⤵PID:3524
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\tmp240640343.exeC:\Users\Admin\AppData\Local\Temp\tmp240640343.exe116⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640390.exeC:\Users\Admin\AppData\Local\Temp\tmp240640390.exe116⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\tmp240640562.exeC:\Users\Admin\AppData\Local\Temp\tmp240640562.exe117⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640578.exeC:\Users\Admin\AppData\Local\Temp\tmp240640578.exe117⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\tmp240640718.exeC:\Users\Admin\AppData\Local\Temp\tmp240640718.exe118⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640750.exeC:\Users\Admin\AppData\Local\Temp\tmp240640750.exe118⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\tmp240640906.exeC:\Users\Admin\AppData\Local\Temp\tmp240640906.exe119⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640953.exeC:\Users\Admin\AppData\Local\Temp\tmp240640953.exe119⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\tmp240641203.exeC:\Users\Admin\AppData\Local\Temp\tmp240641203.exe120⤵PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641234.exeC:\Users\Admin\AppData\Local\Temp\tmp240641234.exe120⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\tmp240641546.exeC:\Users\Admin\AppData\Local\Temp\tmp240641546.exe121⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641656.exeC:\Users\Admin\AppData\Local\Temp\tmp240641656.exe121⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\tmp240641703.exeC:\Users\Admin\AppData\Local\Temp\tmp240641703.exe122⤵PID:2608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-