Analysis
-
max time kernel
68s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 12:53
Behavioral task
behavioral1
Sample
dce7b4d4b69ab0a740d898d331a08620N.exe
Resource
win7-20240903-en
General
-
Target
dce7b4d4b69ab0a740d898d331a08620N.exe
-
Size
5.5MB
-
MD5
dce7b4d4b69ab0a740d898d331a08620
-
SHA1
20093ed2389ba386df3c185307b8d6f22736a31f
-
SHA256
c1492f83bf7e7e40541318e27fd7062d7e4d2319100feb9627c6f2aac98644b4
-
SHA512
713b1bcf8c2db2f617b46217689d83c320f2b264f1da7ade450e7765eba3bc77cf302d4491444cb64841774cb2590bbe24c28ba6dd3cb343cef2ea9801da7441
-
SSDEEP
98304:Az5W8z5WNz5W+z5Wrz5Wwz5Wdz5W8z5WNz5W+z5Wrz5Wwz5WVeRg5W05W:lR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 61 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240612546.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240626375.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240661968.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240666656.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240616531.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240627515.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240648234.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240664484.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240626921.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240640984.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240653046.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240674593.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240656812.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240671484.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240616203.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240628515.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240633968.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240642281.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240645406.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240675781.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240620031.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240637687.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240656062.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240659062.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240673359.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240630015.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240651734.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240659937.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240663296.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240625312.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240625781.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240631062.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240643250.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240654312.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240678875.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240614296.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240614750.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240631687.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240635734.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240644171.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240629046.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240632171.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240646421.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240650781.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240665703.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240634718.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240648843.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240657656.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240661015.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240633187.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240639593.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240640187.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240669546.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240672546.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240613578.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240649937.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240677546.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240623437.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240636593.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240667562.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation tmp240639000.exe -
Executes dropped EXE 64 IoCs
pid Process 1152 tmp240612546.exe 4120 tmp240612609.exe 3232 notpad.exe 4788 tmp240613578.exe 4488 tmp240613921.exe 1476 notpad.exe 2912 tmp240614296.exe 1728 tmp240614546.exe 3528 notpad.exe 3688 tmp240614750.exe 536 tmp240614796.exe 968 notpad.exe 4212 tmp240616203.exe 832 tmp240616265.exe 1576 notpad.exe 1284 tmp240616531.exe 3628 tmp240616484.exe 3556 tmp240616578.exe 4312 tmp240616609.exe 4700 tmp240616703.exe 556 tmp240616765.exe 4388 notpad.exe 4688 tmp240620031.exe 1780 tmp240620828.exe 3892 tmp240620968.exe 3724 tmp240621031.exe 2748 tmp240621250.exe 3932 tmp240621328.exe 3496 notpad.exe 3256 tmp240623437.exe 3276 tmp240623500.exe 4596 tmp240623671.exe 1564 notpad.exe 2592 tmp240624359.exe 1516 tmp240625312.exe 1636 tmp240625359.exe 2388 tmp240625437.exe 4836 tmp240625375.exe 4048 tmp240625562.exe 2956 tmp240625609.exe 2896 tmp240625578.exe 3308 notpad.exe 3356 tmp240625656.exe 908 tmp240625781.exe 3628 tmp240625796.exe 2516 tmp240625828.exe 4700 tmp240625859.exe 2272 tmp240626000.exe 4884 tmp240626015.exe 1100 tmp240626078.exe 2404 tmp240626046.exe 4992 tmp240626171.exe 2220 tmp240626203.exe 3068 tmp240626265.exe 2984 tmp240626312.exe 1404 notpad.exe 4156 tmp240626375.exe 760 tmp240626421.exe 1152 tmp240626578.exe 1368 tmp240626625.exe 3932 tmp240626750.exe 2072 tmp240626781.exe 2160 notpad.exe 1060 tmp240626921.exe -
resource yara_rule behavioral2/memory/2312-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2312-9-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000023436-21.dat upx behavioral2/memory/3232-32-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000023432-38.dat upx behavioral2/memory/3232-52-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1476-54-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1476-72-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3528-77-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3528-87-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000023436-107.dat upx behavioral2/memory/968-129-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1576-131-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/832-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1576-163-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4312-173-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4312-160-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00090000000006cf-184.dat upx behavioral2/memory/4388-204-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3724-224-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1780-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3724-237-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000002344d-240.dat upx behavioral2/memory/3496-241-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3276-256-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3496-263-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1564-267-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2592-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3276-276-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2592-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1564-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4836-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2388-307-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4836-314-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3308-333-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3356-335-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2516-331-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4700-353-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2516-356-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2404-368-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2220-376-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1404-390-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/760-404-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1368-415-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2072-413-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2180-432-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2072-430-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2180-445-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2160-449-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4980-461-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2264-463-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3972-477-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2872-475-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4048-479-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4980-491-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4048-499-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3400-497-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3400-510-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1276-507-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2872-515-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1276-528-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4928-533-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4400-531-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2380-538-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe- tmp240645406.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240649937.exe File created C:\Windows\SysWOW64\notpad.exe tmp240663296.exe File created C:\Windows\SysWOW64\notpad.exe tmp240614296.exe File created C:\Windows\SysWOW64\notpad.exe tmp240623437.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240631687.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240633968.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240639000.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240640984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240659062.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240613578.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240623437.exe File created C:\Windows\SysWOW64\notpad.exe tmp240648234.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240667562.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240626921.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240639000.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240647359.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240659937.exe File created C:\Windows\SysWOW64\notpad.exe tmp240678875.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240614296.exe File created C:\Windows\SysWOW64\notpad.exe tmp240614750.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240620031.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240650781.exe File created C:\Windows\SysWOW64\notpad.exe tmp240657656.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240674593.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240616203.exe File created C:\Windows\SysWOW64\notpad.exe tmp240626375.exe File created C:\Windows\SysWOW64\notpad.exe tmp240633968.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240661968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240664484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240627515.exe File created C:\Windows\SysWOW64\notpad.exe tmp240635734.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240639593.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240665703.exe File created C:\Windows\SysWOW64\notpad.exe tmp240612546.exe File created C:\Windows\SysWOW64\notpad.exe tmp240643250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240657656.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240677546.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240614750.exe File created C:\Windows\SysWOW64\notpad.exe tmp240626921.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240631062.exe File created C:\Windows\SysWOW64\notpad.exe tmp240637687.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240654312.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240674593.exe File created C:\Windows\SysWOW64\notpad.exe tmp240675781.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240612546.exe File created C:\Windows\SysWOW64\notpad.exe tmp240616531.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240626375.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240636593.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240640984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240654312.exe File created C:\Windows\SysWOW64\notpad.exe tmp240656812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240677546.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240647359.exe File created C:\Windows\SysWOW64\notpad.exe tmp240613578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240630015.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240646421.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240648843.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240633187.exe File created C:\Windows\SysWOW64\notpad.exe tmp240616203.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240632171.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240643250.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240648843.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240659062.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240652703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240659140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240659296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240665437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240671562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240638359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240661328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240673125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240616531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240632906.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240633968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240638015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240613578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240642750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648812.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240665359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240666656.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240670671.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240678187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240654296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240663703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240664281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240664968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240670328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240675890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240616765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240667531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240679375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240644359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240655640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240675609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240641031.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240657703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240662015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240664953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240665390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240671703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240636296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240646078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240655484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240634921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240649890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240654390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240660453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240624359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240630406.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240639500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240640218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240673593.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240680562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240643093.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240643671.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240659171.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240627703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240630859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240646515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240654984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240633312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240643375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240652640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240656859.exe -
Modifies registry class 62 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240666656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240672546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240634718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240635734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240656062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240656812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240633968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240650781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240654312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240657656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240677546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240667562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240675781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240651734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240659937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240665703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240664484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240659062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240669546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240673359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240671484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240613578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240637687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240653046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240674593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240678875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240663296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240633187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240661015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240661968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631687.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1152 2312 dce7b4d4b69ab0a740d898d331a08620N.exe 83 PID 2312 wrote to memory of 1152 2312 dce7b4d4b69ab0a740d898d331a08620N.exe 83 PID 2312 wrote to memory of 1152 2312 dce7b4d4b69ab0a740d898d331a08620N.exe 83 PID 2312 wrote to memory of 4120 2312 dce7b4d4b69ab0a740d898d331a08620N.exe 84 PID 2312 wrote to memory of 4120 2312 dce7b4d4b69ab0a740d898d331a08620N.exe 84 PID 2312 wrote to memory of 4120 2312 dce7b4d4b69ab0a740d898d331a08620N.exe 84 PID 1152 wrote to memory of 3232 1152 tmp240612546.exe 85 PID 1152 wrote to memory of 3232 1152 tmp240612546.exe 85 PID 1152 wrote to memory of 3232 1152 tmp240612546.exe 85 PID 3232 wrote to memory of 4788 3232 notpad.exe 87 PID 3232 wrote to memory of 4788 3232 notpad.exe 87 PID 3232 wrote to memory of 4788 3232 notpad.exe 87 PID 3232 wrote to memory of 4488 3232 notpad.exe 89 PID 3232 wrote to memory of 4488 3232 notpad.exe 89 PID 3232 wrote to memory of 4488 3232 notpad.exe 89 PID 4788 wrote to memory of 1476 4788 tmp240613578.exe 90 PID 4788 wrote to memory of 1476 4788 tmp240613578.exe 90 PID 4788 wrote to memory of 1476 4788 tmp240613578.exe 90 PID 1476 wrote to memory of 2912 1476 notpad.exe 91 PID 1476 wrote to memory of 2912 1476 notpad.exe 91 PID 1476 wrote to memory of 2912 1476 notpad.exe 91 PID 1476 wrote to memory of 1728 1476 notpad.exe 92 PID 1476 wrote to memory of 1728 1476 notpad.exe 92 PID 1476 wrote to memory of 1728 1476 notpad.exe 92 PID 2912 wrote to memory of 3528 2912 tmp240614296.exe 93 PID 2912 wrote to memory of 3528 2912 tmp240614296.exe 93 PID 2912 wrote to memory of 3528 2912 tmp240614296.exe 93 PID 3528 wrote to memory of 3688 3528 notpad.exe 94 PID 3528 wrote to memory of 3688 3528 notpad.exe 94 PID 3528 wrote to memory of 3688 3528 notpad.exe 94 PID 3528 wrote to memory of 536 3528 notpad.exe 95 PID 3528 wrote to memory of 536 3528 notpad.exe 95 PID 3528 wrote to memory of 536 3528 notpad.exe 95 PID 3688 wrote to memory of 968 3688 tmp240614750.exe 97 PID 3688 wrote to memory of 968 3688 tmp240614750.exe 97 PID 3688 wrote to memory of 968 3688 tmp240614750.exe 97 PID 968 wrote to memory of 4212 968 notpad.exe 98 PID 968 wrote to memory of 4212 968 notpad.exe 98 PID 968 wrote to memory of 4212 968 notpad.exe 98 PID 968 wrote to memory of 832 968 notpad.exe 99 PID 968 wrote to memory of 832 968 notpad.exe 99 PID 968 wrote to memory of 832 968 notpad.exe 99 PID 4212 wrote to memory of 1576 4212 tmp240616203.exe 100 PID 4212 wrote to memory of 1576 4212 tmp240616203.exe 100 PID 4212 wrote to memory of 1576 4212 tmp240616203.exe 100 PID 832 wrote to memory of 1284 832 tmp240616265.exe 102 PID 832 wrote to memory of 1284 832 tmp240616265.exe 102 PID 832 wrote to memory of 1284 832 tmp240616265.exe 102 PID 1576 wrote to memory of 3628 1576 notpad.exe 135 PID 1576 wrote to memory of 3628 1576 notpad.exe 135 PID 1576 wrote to memory of 3628 1576 notpad.exe 135 PID 832 wrote to memory of 3556 832 tmp240616265.exe 103 PID 832 wrote to memory of 3556 832 tmp240616265.exe 103 PID 832 wrote to memory of 3556 832 tmp240616265.exe 103 PID 1576 wrote to memory of 4312 1576 notpad.exe 104 PID 1576 wrote to memory of 4312 1576 notpad.exe 104 PID 1576 wrote to memory of 4312 1576 notpad.exe 104 PID 4312 wrote to memory of 4700 4312 tmp240616609.exe 137 PID 4312 wrote to memory of 4700 4312 tmp240616609.exe 137 PID 4312 wrote to memory of 4700 4312 tmp240616609.exe 137 PID 4312 wrote to memory of 556 4312 tmp240616609.exe 106 PID 4312 wrote to memory of 556 4312 tmp240616609.exe 106 PID 4312 wrote to memory of 556 4312 tmp240616609.exe 106 PID 1284 wrote to memory of 4388 1284 tmp240616531.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\dce7b4d4b69ab0a740d898d331a08620N.exe"C:\Users\Admin\AppData\Local\Temp\dce7b4d4b69ab0a740d898d331a08620N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\tmp240612546.exeC:\Users\Admin\AppData\Local\Temp\tmp240612546.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\tmp240613578.exeC:\Users\Admin\AppData\Local\Temp\tmp240613578.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\tmp240614296.exeC:\Users\Admin\AppData\Local\Temp\tmp240614296.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\tmp240614750.exeC:\Users\Admin\AppData\Local\Temp\tmp240614750.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\tmp240616203.exeC:\Users\Admin\AppData\Local\Temp\tmp240616203.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\tmp240616484.exeC:\Users\Admin\AppData\Local\Temp\tmp240616484.exe12⤵
- Executes dropped EXE
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616609.exeC:\Users\Admin\AppData\Local\Temp\tmp240616609.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\tmp240616703.exeC:\Users\Admin\AppData\Local\Temp\tmp240616703.exe13⤵
- Executes dropped EXE
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616765.exeC:\Users\Admin\AppData\Local\Temp\tmp240616765.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240616265.exeC:\Users\Admin\AppData\Local\Temp\tmp240616265.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\tmp240616531.exeC:\Users\Admin\AppData\Local\Temp\tmp240616531.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\tmp240620031.exeC:\Users\Admin\AppData\Local\Temp\tmp240620031.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4688 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\tmp240623437.exeC:\Users\Admin\AppData\Local\Temp\tmp240623437.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3256 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\tmp240625312.exeC:\Users\Admin\AppData\Local\Temp\tmp240625312.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1516 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\tmp240625781.exeC:\Users\Admin\AppData\Local\Temp\tmp240625781.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:908 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\tmp240626375.exeC:\Users\Admin\AppData\Local\Temp\tmp240626375.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4156 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\tmp240627015.exeC:\Users\Admin\AppData\Local\Temp\tmp240627015.exe23⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240627062.exeC:\Users\Admin\AppData\Local\Temp\tmp240627062.exe23⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\tmp240627296.exeC:\Users\Admin\AppData\Local\Temp\tmp240627296.exe24⤵PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240627343.exeC:\Users\Admin\AppData\Local\Temp\tmp240627343.exe24⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\tmp240627515.exeC:\Users\Admin\AppData\Local\Temp\tmp240627515.exe25⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\tmp240628515.exeC:\Users\Admin\AppData\Local\Temp\tmp240628515.exe27⤵
- Checks computer location settings
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\tmp240629046.exeC:\Users\Admin\AppData\Local\Temp\tmp240629046.exe29⤵
- Checks computer location settings
- Modifies registry class
PID:1028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\tmp240629859.exeC:\Users\Admin\AppData\Local\Temp\tmp240629859.exe31⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629937.exeC:\Users\Admin\AppData\Local\Temp\tmp240629937.exe31⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\tmp240630437.exeC:\Users\Admin\AppData\Local\Temp\tmp240630437.exe32⤵PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630500.exeC:\Users\Admin\AppData\Local\Temp\tmp240630500.exe32⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\tmp240630828.exeC:\Users\Admin\AppData\Local\Temp\tmp240630828.exe33⤵PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630859.exeC:\Users\Admin\AppData\Local\Temp\tmp240630859.exe33⤵
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\tmp240631015.exeC:\Users\Admin\AppData\Local\Temp\tmp240631015.exe34⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631046.exeC:\Users\Admin\AppData\Local\Temp\tmp240631046.exe34⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\tmp240631265.exeC:\Users\Admin\AppData\Local\Temp\tmp240631265.exe35⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631343.exeC:\Users\Admin\AppData\Local\Temp\tmp240631343.exe35⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\tmp240631484.exeC:\Users\Admin\AppData\Local\Temp\tmp240631484.exe36⤵PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631531.exeC:\Users\Admin\AppData\Local\Temp\tmp240631531.exe36⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\tmp240631593.exeC:\Users\Admin\AppData\Local\Temp\tmp240631593.exe37⤵PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631640.exeC:\Users\Admin\AppData\Local\Temp\tmp240631640.exe37⤵PID:2200
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629171.exeC:\Users\Admin\AppData\Local\Temp\tmp240629171.exe29⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\tmp240629546.exeC:\Users\Admin\AppData\Local\Temp\tmp240629546.exe30⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629578.exeC:\Users\Admin\AppData\Local\Temp\tmp240629578.exe30⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\tmp240629828.exeC:\Users\Admin\AppData\Local\Temp\tmp240629828.exe31⤵PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629875.exeC:\Users\Admin\AppData\Local\Temp\tmp240629875.exe31⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\tmp240630109.exeC:\Users\Admin\AppData\Local\Temp\tmp240630109.exe32⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630171.exeC:\Users\Admin\AppData\Local\Temp\tmp240630171.exe32⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\tmp240630406.exeC:\Users\Admin\AppData\Local\Temp\tmp240630406.exe33⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630468.exeC:\Users\Admin\AppData\Local\Temp\tmp240630468.exe33⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\tmp240630656.exeC:\Users\Admin\AppData\Local\Temp\tmp240630656.exe34⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630703.exeC:\Users\Admin\AppData\Local\Temp\tmp240630703.exe34⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\tmp240630765.exeC:\Users\Admin\AppData\Local\Temp\tmp240630765.exe35⤵PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240630812.exeC:\Users\Admin\AppData\Local\Temp\tmp240630812.exe35⤵PID:4492
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240628562.exeC:\Users\Admin\AppData\Local\Temp\tmp240628562.exe27⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\tmp240628906.exeC:\Users\Admin\AppData\Local\Temp\tmp240628906.exe28⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240628937.exeC:\Users\Admin\AppData\Local\Temp\tmp240628937.exe28⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\tmp240629156.exeC:\Users\Admin\AppData\Local\Temp\tmp240629156.exe29⤵PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629203.exeC:\Users\Admin\AppData\Local\Temp\tmp240629203.exe29⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\tmp240629484.exeC:\Users\Admin\AppData\Local\Temp\tmp240629484.exe30⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629562.exeC:\Users\Admin\AppData\Local\Temp\tmp240629562.exe30⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\tmp240629750.exeC:\Users\Admin\AppData\Local\Temp\tmp240629750.exe31⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240629796.exeC:\Users\Admin\AppData\Local\Temp\tmp240629796.exe31⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\tmp240630015.exeC:\Users\Admin\AppData\Local\Temp\tmp240630015.exe32⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\tmp240631062.exeC:\Users\Admin\AppData\Local\Temp\tmp240631062.exe34⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:744 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\tmp240631687.exeC:\Users\Admin\AppData\Local\Temp\tmp240631687.exe36⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\tmp240632312.exeC:\Users\Admin\AppData\Local\Temp\tmp240632312.exe38⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632484.exeC:\Users\Admin\AppData\Local\Temp\tmp240632484.exe38⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\tmp240632906.exeC:\Users\Admin\AppData\Local\Temp\tmp240632906.exe39⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631750.exeC:\Users\Admin\AppData\Local\Temp\tmp240631750.exe36⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\tmp240632125.exeC:\Users\Admin\AppData\Local\Temp\tmp240632125.exe37⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632156.exeC:\Users\Admin\AppData\Local\Temp\tmp240632156.exe37⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\tmp240632859.exeC:\Users\Admin\AppData\Local\Temp\tmp240632859.exe38⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632953.exeC:\Users\Admin\AppData\Local\Temp\tmp240632953.exe38⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\tmp240633203.exeC:\Users\Admin\AppData\Local\Temp\tmp240633203.exe39⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633265.exeC:\Users\Admin\AppData\Local\Temp\tmp240633265.exe39⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\tmp240633578.exeC:\Users\Admin\AppData\Local\Temp\tmp240633578.exe40⤵PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633640.exeC:\Users\Admin\AppData\Local\Temp\tmp240633640.exe40⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\tmp240633781.exeC:\Users\Admin\AppData\Local\Temp\tmp240633781.exe41⤵PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633812.exeC:\Users\Admin\AppData\Local\Temp\tmp240633812.exe41⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\tmp240633953.exeC:\Users\Admin\AppData\Local\Temp\tmp240633953.exe42⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634000.exeC:\Users\Admin\AppData\Local\Temp\tmp240634000.exe42⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\tmp240634125.exeC:\Users\Admin\AppData\Local\Temp\tmp240634125.exe43⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634218.exeC:\Users\Admin\AppData\Local\Temp\tmp240634218.exe43⤵PID:3772
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631109.exeC:\Users\Admin\AppData\Local\Temp\tmp240631109.exe34⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\tmp240631500.exeC:\Users\Admin\AppData\Local\Temp\tmp240631500.exe35⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631562.exeC:\Users\Admin\AppData\Local\Temp\tmp240631562.exe35⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\tmp240631812.exeC:\Users\Admin\AppData\Local\Temp\tmp240631812.exe36⤵PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240631875.exeC:\Users\Admin\AppData\Local\Temp\tmp240631875.exe36⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\tmp240632171.exeC:\Users\Admin\AppData\Local\Temp\tmp240632171.exe37⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3572 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\tmp240633390.exeC:\Users\Admin\AppData\Local\Temp\tmp240633390.exe39⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633453.exeC:\Users\Admin\AppData\Local\Temp\tmp240633453.exe39⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\tmp240633875.exeC:\Users\Admin\AppData\Local\Temp\tmp240633875.exe40⤵PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633906.exeC:\Users\Admin\AppData\Local\Temp\tmp240633906.exe40⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\tmp240634296.exeC:\Users\Admin\AppData\Local\Temp\tmp240634296.exe41⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634359.exeC:\Users\Admin\AppData\Local\Temp\tmp240634359.exe41⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\tmp240634640.exeC:\Users\Admin\AppData\Local\Temp\tmp240634640.exe42⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634687.exeC:\Users\Admin\AppData\Local\Temp\tmp240634687.exe42⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\tmp240634921.exeC:\Users\Admin\AppData\Local\Temp\tmp240634921.exe43⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634984.exeC:\Users\Admin\AppData\Local\Temp\tmp240634984.exe43⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\tmp240635234.exeC:\Users\Admin\AppData\Local\Temp\tmp240635234.exe44⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635296.exeC:\Users\Admin\AppData\Local\Temp\tmp240635296.exe44⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\tmp240635421.exeC:\Users\Admin\AppData\Local\Temp\tmp240635421.exe45⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635484.exeC:\Users\Admin\AppData\Local\Temp\tmp240635484.exe45⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\tmp240635546.exeC:\Users\Admin\AppData\Local\Temp\tmp240635546.exe46⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635609.exeC:\Users\Admin\AppData\Local\Temp\tmp240635609.exe46⤵PID:1928
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632468.exeC:\Users\Admin\AppData\Local\Temp\tmp240632468.exe37⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\tmp240632812.exeC:\Users\Admin\AppData\Local\Temp\tmp240632812.exe38⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240632921.exeC:\Users\Admin\AppData\Local\Temp\tmp240632921.exe38⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\tmp240633062.exeC:\Users\Admin\AppData\Local\Temp\tmp240633062.exe39⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240633093.exeC:\Users\Admin\AppData\Local\Temp\tmp240633093.exe39⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\tmp240633187.exeC:\Users\Admin\AppData\Local\Temp\tmp240633187.exe40⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3232 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\tmp240633968.exeC:\Users\Admin\AppData\Local\Temp\tmp240633968.exe42⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1888 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\tmp240634718.exeC:\Users\Admin\AppData\Local\Temp\tmp240634718.exe44⤵
- Checks computer location settings
- Modifies registry class
PID:632 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\tmp240635750.exeC:\Users\Admin\AppData\Local\Temp\tmp240635750.exe46⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635828.exeC:\Users\Admin\AppData\Local\Temp\tmp240635828.exe46⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\tmp240636296.exeC:\Users\Admin\AppData\Local\Temp\tmp240636296.exe47⤵
- System Location Discovery: System Language Discovery
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636656.exeC:\Users\Admin\AppData\Local\Temp\tmp240636656.exe47⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\tmp240637078.exeC:\Users\Admin\AppData\Local\Temp\tmp240637078.exe48⤵PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637125.exeC:\Users\Admin\AppData\Local\Temp\tmp240637125.exe48⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\tmp240637359.exeC:\Users\Admin\AppData\Local\Temp\tmp240637359.exe49⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637406.exeC:\Users\Admin\AppData\Local\Temp\tmp240637406.exe49⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\tmp240637625.exeC:\Users\Admin\AppData\Local\Temp\tmp240637625.exe50⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637656.exeC:\Users\Admin\AppData\Local\Temp\tmp240637656.exe50⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\tmp240637859.exeC:\Users\Admin\AppData\Local\Temp\tmp240637859.exe51⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637906.exeC:\Users\Admin\AppData\Local\Temp\tmp240637906.exe51⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\tmp240638078.exeC:\Users\Admin\AppData\Local\Temp\tmp240638078.exe52⤵PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638140.exeC:\Users\Admin\AppData\Local\Temp\tmp240638140.exe52⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\tmp240638203.exeC:\Users\Admin\AppData\Local\Temp\tmp240638203.exe53⤵PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638250.exeC:\Users\Admin\AppData\Local\Temp\tmp240638250.exe53⤵PID:1900
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240634796.exeC:\Users\Admin\AppData\Local\Temp\tmp240634796.exe44⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\tmp240635312.exeC:\Users\Admin\AppData\Local\Temp\tmp240635312.exe45⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240635390.exeC:\Users\Admin\AppData\Local\Temp\tmp240635390.exe45⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\tmp240635734.exeC:\Users\Admin\AppData\Local\Temp\tmp240635734.exe46⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\tmp240636765.exeC:\Users\Admin\AppData\Local\Temp\tmp240636765.exe48⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240636843.exeC:\Users\Admin\AppData\Local\Temp\tmp240636843.exe48⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\tmp240637187.exeC:\Users\Admin\AppData\Local\Temp\tmp240637187.exe49⤵PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637218.exeC:\Users\Admin\AppData\Local\Temp\tmp240637218.exe49⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\tmp240637687.exeC:\Users\Admin\AppData\Local\Temp\tmp240637687.exe50⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:632 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\tmp240639031.exeC:\Users\Admin\AppData\Local\Temp\tmp240639031.exe52⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639078.exeC:\Users\Admin\AppData\Local\Temp\tmp240639078.exe52⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\tmp240639515.exeC:\Users\Admin\AppData\Local\Temp\tmp240639515.exe53⤵PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639656.exeC:\Users\Admin\AppData\Local\Temp\tmp240639656.exe53⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\tmp240640078.exeC:\Users\Admin\AppData\Local\Temp\tmp240640078.exe54⤵PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640125.exeC:\Users\Admin\AppData\Local\Temp\tmp240640125.exe54⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\tmp240640593.exeC:\Users\Admin\AppData\Local\Temp\tmp240640593.exe55⤵PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240640671.exeC:\Users\Admin\AppData\Local\Temp\tmp240640671.exe55⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\tmp240640984.exeC:\Users\Admin\AppData\Local\Temp\tmp240640984.exe56⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4928 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\tmp240642281.exeC:\Users\Admin\AppData\Local\Temp\tmp240642281.exe58⤵
- Checks computer location settings
- Modifies registry class
PID:2396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\tmp240643281.exeC:\Users\Admin\AppData\Local\Temp\tmp240643281.exe60⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643343.exeC:\Users\Admin\AppData\Local\Temp\tmp240643343.exe60⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\tmp240643890.exeC:\Users\Admin\AppData\Local\Temp\tmp240643890.exe61⤵PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643953.exeC:\Users\Admin\AppData\Local\Temp\tmp240643953.exe61⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\tmp240644296.exeC:\Users\Admin\AppData\Local\Temp\tmp240644296.exe62⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644359.exeC:\Users\Admin\AppData\Local\Temp\tmp240644359.exe62⤵
- System Location Discovery: System Language Discovery
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\tmp240644718.exeC:\Users\Admin\AppData\Local\Temp\tmp240644718.exe63⤵PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644984.exeC:\Users\Admin\AppData\Local\Temp\tmp240644984.exe63⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\tmp240645250.exeC:\Users\Admin\AppData\Local\Temp\tmp240645250.exe64⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645296.exeC:\Users\Admin\AppData\Local\Temp\tmp240645296.exe64⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\tmp240645609.exeC:\Users\Admin\AppData\Local\Temp\tmp240645609.exe65⤵PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645687.exeC:\Users\Admin\AppData\Local\Temp\tmp240645687.exe65⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\tmp240645953.exeC:\Users\Admin\AppData\Local\Temp\tmp240645953.exe66⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646078.exeC:\Users\Admin\AppData\Local\Temp\tmp240646078.exe66⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\tmp240646234.exeC:\Users\Admin\AppData\Local\Temp\tmp240646234.exe67⤵PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646296.exeC:\Users\Admin\AppData\Local\Temp\tmp240646296.exe67⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\tmp240646484.exeC:\Users\Admin\AppData\Local\Temp\tmp240646484.exe68⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646562.exeC:\Users\Admin\AppData\Local\Temp\tmp240646562.exe68⤵PID:3328
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642359.exeC:\Users\Admin\AppData\Local\Temp\tmp240642359.exe58⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\tmp240642937.exeC:\Users\Admin\AppData\Local\Temp\tmp240642937.exe59⤵PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643015.exeC:\Users\Admin\AppData\Local\Temp\tmp240643015.exe59⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\tmp240643671.exeC:\Users\Admin\AppData\Local\Temp\tmp240643671.exe60⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240643734.exeC:\Users\Admin\AppData\Local\Temp\tmp240643734.exe60⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\tmp240644000.exeC:\Users\Admin\AppData\Local\Temp\tmp240644000.exe61⤵PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644046.exeC:\Users\Admin\AppData\Local\Temp\tmp240644046.exe61⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\tmp240644343.exeC:\Users\Admin\AppData\Local\Temp\tmp240644343.exe62⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644406.exeC:\Users\Admin\AppData\Local\Temp\tmp240644406.exe62⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\tmp240644750.exeC:\Users\Admin\AppData\Local\Temp\tmp240644750.exe63⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240644953.exeC:\Users\Admin\AppData\Local\Temp\tmp240644953.exe63⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\tmp240645109.exeC:\Users\Admin\AppData\Local\Temp\tmp240645109.exe64⤵PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645171.exeC:\Users\Admin\AppData\Local\Temp\tmp240645171.exe64⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\tmp240645406.exeC:\Users\Admin\AppData\Local\Temp\tmp240645406.exe65⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2696 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\tmp240646453.exeC:\Users\Admin\AppData\Local\Temp\tmp240646453.exe67⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646515.exeC:\Users\Admin\AppData\Local\Temp\tmp240646515.exe67⤵
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\tmp240646968.exeC:\Users\Admin\AppData\Local\Temp\tmp240646968.exe68⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240647046.exeC:\Users\Admin\AppData\Local\Temp\tmp240647046.exe68⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\tmp240647546.exeC:\Users\Admin\AppData\Local\Temp\tmp240647546.exe69⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240647671.exeC:\Users\Admin\AppData\Local\Temp\tmp240647671.exe69⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\tmp240648078.exeC:\Users\Admin\AppData\Local\Temp\tmp240648078.exe70⤵PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648109.exeC:\Users\Admin\AppData\Local\Temp\tmp240648109.exe70⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\tmp240648421.exeC:\Users\Admin\AppData\Local\Temp\tmp240648421.exe71⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648531.exeC:\Users\Admin\AppData\Local\Temp\tmp240648531.exe71⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\tmp240648812.exeC:\Users\Admin\AppData\Local\Temp\tmp240648812.exe72⤵
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648984.exeC:\Users\Admin\AppData\Local\Temp\tmp240648984.exe72⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\tmp240649265.exeC:\Users\Admin\AppData\Local\Temp\tmp240649265.exe73⤵PID:672
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649453.exeC:\Users\Admin\AppData\Local\Temp\tmp240649453.exe73⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\tmp240649750.exeC:\Users\Admin\AppData\Local\Temp\tmp240649750.exe74⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649796.exeC:\Users\Admin\AppData\Local\Temp\tmp240649796.exe74⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\tmp240649843.exeC:\Users\Admin\AppData\Local\Temp\tmp240649843.exe75⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649890.exeC:\Users\Admin\AppData\Local\Temp\tmp240649890.exe75⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645484.exeC:\Users\Admin\AppData\Local\Temp\tmp240645484.exe65⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\tmp240645703.exeC:\Users\Admin\AppData\Local\Temp\tmp240645703.exe66⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645828.exeC:\Users\Admin\AppData\Local\Temp\tmp240645828.exe66⤵PID:4928
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641078.exeC:\Users\Admin\AppData\Local\Temp\tmp240641078.exe56⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\tmp240641406.exeC:\Users\Admin\AppData\Local\Temp\tmp240641406.exe57⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641531.exeC:\Users\Admin\AppData\Local\Temp\tmp240641531.exe57⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\tmp240641781.exeC:\Users\Admin\AppData\Local\Temp\tmp240641781.exe58⤵PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642203.exeC:\Users\Admin\AppData\Local\Temp\tmp240642203.exe58⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\tmp240642437.exeC:\Users\Admin\AppData\Local\Temp\tmp240642437.exe59⤵PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642562.exeC:\Users\Admin\AppData\Local\Temp\tmp240642562.exe59⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\tmp240642781.exeC:\Users\Admin\AppData\Local\Temp\tmp240642781.exe60⤵PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642859.exeC:\Users\Admin\AppData\Local\Temp\tmp240642859.exe60⤵PID:4172
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240637734.exeC:\Users\Admin\AppData\Local\Temp\tmp240637734.exe50⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\tmp240638093.exeC:\Users\Admin\AppData\Local\Temp\tmp240638093.exe51⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638234.exeC:\Users\Admin\AppData\Local\Temp\tmp240638234.exe51⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\tmp240638500.exeC:\Users\Admin\AppData\Local\Temp\tmp240638500.exe52⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240638812.exeC:\Users\Admin\AppData\Local\Temp\tmp240638812.exe52⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\tmp240639000.exeC:\Users\Admin\AppData\Local\Temp\tmp240639000.exe53⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1748 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\tmp240639718.exeC:\Users\Admin\AppData\Local\Temp\tmp240639718.exe55⤵PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240639828.exeC:\Users\Admin\AppData\Local\Temp\tmp240639828.exe55⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\tmp240640187.exeC:\Users\Admin\AppData\Local\Temp\tmp240640187.exe56⤵
- Checks computer location settings
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\tmp240641031.exeC:\Users\Admin\AppData\Local\Temp\tmp240641031.exe58⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240641234.exeC:\Users\Admin\AppData\Local\Temp\tmp240641234.exe58⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\tmp240641765.exeC:\Users\Admin\AppData\Local\Temp\tmp240641765.exe59⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642046.exeC:\Users\Admin\AppData\Local\Temp\tmp240642046.exe59⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\tmp240642750.exeC:\Users\Admin\AppData\Local\Temp\tmp240642750.exe60⤵
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240642828.exeC:\Users\Admin\AppData\Local\Temp\tmp240642828.exe60⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\tmp240643250.exeC:\Users\Admin\AppData\Local\Temp\tmp240643250.exe61⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:432 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\tmp240644171.exeC:\Users\Admin\AppData\Local\Temp\tmp240644171.exe63⤵
- Checks computer location settings
- Modifies registry class
PID:1912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\tmp240645281.exeC:\Users\Admin\AppData\Local\Temp\tmp240645281.exe65⤵PID:4212
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645328.exeC:\Users\Admin\AppData\Local\Temp\tmp240645328.exe65⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\tmp240645937.exeC:\Users\Admin\AppData\Local\Temp\tmp240645937.exe66⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240645984.exeC:\Users\Admin\AppData\Local\Temp\tmp240645984.exe66⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\tmp240646406.exeC:\Users\Admin\AppData\Local\Temp\tmp240646406.exe67⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240646437.exeC:\Users\Admin\AppData\Local\Temp\tmp240646437.exe67⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\tmp240646890.exeC:\Users\Admin\AppData\Local\Temp\tmp240646890.exe68⤵PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240647015.exeC:\Users\Admin\AppData\Local\Temp\tmp240647015.exe68⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\tmp240647359.exeC:\Users\Admin\AppData\Local\Temp\tmp240647359.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:4820 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\tmp240648250.exeC:\Users\Admin\AppData\Local\Temp\tmp240648250.exe71⤵PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648328.exeC:\Users\Admin\AppData\Local\Temp\tmp240648328.exe71⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\tmp240648843.exeC:\Users\Admin\AppData\Local\Temp\tmp240648843.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\tmp240649953.exeC:\Users\Admin\AppData\Local\Temp\tmp240649953.exe74⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649984.exeC:\Users\Admin\AppData\Local\Temp\tmp240649984.exe74⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\tmp240650515.exeC:\Users\Admin\AppData\Local\Temp\tmp240650515.exe75⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650593.exeC:\Users\Admin\AppData\Local\Temp\tmp240650593.exe75⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\tmp240651312.exeC:\Users\Admin\AppData\Local\Temp\tmp240651312.exe76⤵PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651390.exeC:\Users\Admin\AppData\Local\Temp\tmp240651390.exe76⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\tmp240651984.exeC:\Users\Admin\AppData\Local\Temp\tmp240651984.exe77⤵PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652250.exeC:\Users\Admin\AppData\Local\Temp\tmp240652250.exe77⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\tmp240652718.exeC:\Users\Admin\AppData\Local\Temp\tmp240652718.exe78⤵PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652828.exeC:\Users\Admin\AppData\Local\Temp\tmp240652828.exe78⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\tmp240653203.exeC:\Users\Admin\AppData\Local\Temp\tmp240653203.exe79⤵PID:5000
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653281.exeC:\Users\Admin\AppData\Local\Temp\tmp240653281.exe79⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\tmp240653609.exeC:\Users\Admin\AppData\Local\Temp\tmp240653609.exe80⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653703.exeC:\Users\Admin\AppData\Local\Temp\tmp240653703.exe80⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\tmp240654000.exeC:\Users\Admin\AppData\Local\Temp\tmp240654000.exe81⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240654046.exeC:\Users\Admin\AppData\Local\Temp\tmp240654046.exe81⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\tmp240654125.exeC:\Users\Admin\AppData\Local\Temp\tmp240654125.exe82⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240654250.exeC:\Users\Admin\AppData\Local\Temp\tmp240654250.exe82⤵PID:4524
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648953.exeC:\Users\Admin\AppData\Local\Temp\tmp240648953.exe72⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\tmp240649343.exeC:\Users\Admin\AppData\Local\Temp\tmp240649343.exe73⤵PID:644
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649406.exeC:\Users\Admin\AppData\Local\Temp\tmp240649406.exe73⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\tmp240649859.exeC:\Users\Admin\AppData\Local\Temp\tmp240649859.exe74⤵PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650296.exeC:\Users\Admin\AppData\Local\Temp\tmp240650296.exe74⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\tmp240650656.exeC:\Users\Admin\AppData\Local\Temp\tmp240650656.exe75⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650734.exeC:\Users\Admin\AppData\Local\Temp\tmp240650734.exe75⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\tmp240651328.exeC:\Users\Admin\AppData\Local\Temp\tmp240651328.exe76⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651468.exeC:\Users\Admin\AppData\Local\Temp\tmp240651468.exe76⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\tmp240651828.exeC:\Users\Admin\AppData\Local\Temp\tmp240651828.exe77⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651921.exeC:\Users\Admin\AppData\Local\Temp\tmp240651921.exe77⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\tmp240652187.exeC:\Users\Admin\AppData\Local\Temp\tmp240652187.exe78⤵PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652421.exeC:\Users\Admin\AppData\Local\Temp\tmp240652421.exe78⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\tmp240652578.exeC:\Users\Admin\AppData\Local\Temp\tmp240652578.exe79⤵PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652687.exeC:\Users\Admin\AppData\Local\Temp\tmp240652687.exe79⤵PID:1728
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240647515.exeC:\Users\Admin\AppData\Local\Temp\tmp240647515.exe69⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\tmp240647750.exeC:\Users\Admin\AppData\Local\Temp\tmp240647750.exe70⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240647859.exeC:\Users\Admin\AppData\Local\Temp\tmp240647859.exe70⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\tmp240648031.exeC:\Users\Admin\AppData\Local\Temp\tmp240648031.exe71⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240648093.exeC:\Users\Admin\AppData\Local\Temp\tmp240648093.exe71⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\tmp240648234.exeC:\Users\Admin\AppData\Local\Temp\tmp240648234.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3496 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\tmp240649234.exeC:\Users\Admin\AppData\Local\Temp\tmp240649234.exe74⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240649296.exeC:\Users\Admin\AppData\Local\Temp\tmp240649296.exe74⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\tmp240649937.exeC:\Users\Admin\AppData\Local\Temp\tmp240649937.exe75⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\tmp240650781.exeC:\Users\Admin\AppData\Local\Temp\tmp240650781.exe77⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\tmp240651734.exeC:\Users\Admin\AppData\Local\Temp\tmp240651734.exe79⤵
- Checks computer location settings
- Modifies registry class
PID:1908 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\tmp240653375.exeC:\Users\Admin\AppData\Local\Temp\tmp240653375.exe81⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653515.exeC:\Users\Admin\AppData\Local\Temp\tmp240653515.exe81⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\tmp240654078.exeC:\Users\Admin\AppData\Local\Temp\tmp240654078.exe82⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240654171.exeC:\Users\Admin\AppData\Local\Temp\tmp240654171.exe82⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\tmp240655015.exeC:\Users\Admin\AppData\Local\Temp\tmp240655015.exe83⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655078.exeC:\Users\Admin\AppData\Local\Temp\tmp240655078.exe83⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\tmp240655453.exeC:\Users\Admin\AppData\Local\Temp\tmp240655453.exe84⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655484.exeC:\Users\Admin\AppData\Local\Temp\tmp240655484.exe84⤵
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\tmp240655859.exeC:\Users\Admin\AppData\Local\Temp\tmp240655859.exe85⤵PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655921.exeC:\Users\Admin\AppData\Local\Temp\tmp240655921.exe85⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\tmp240656156.exeC:\Users\Admin\AppData\Local\Temp\tmp240656156.exe86⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240656250.exeC:\Users\Admin\AppData\Local\Temp\tmp240656250.exe86⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\tmp240656468.exeC:\Users\Admin\AppData\Local\Temp\tmp240656468.exe87⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240656531.exeC:\Users\Admin\AppData\Local\Temp\tmp240656531.exe87⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\tmp240656671.exeC:\Users\Admin\AppData\Local\Temp\tmp240656671.exe88⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240656718.exeC:\Users\Admin\AppData\Local\Temp\tmp240656718.exe88⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\tmp240656859.exeC:\Users\Admin\AppData\Local\Temp\tmp240656859.exe89⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240656921.exeC:\Users\Admin\AppData\Local\Temp\tmp240656921.exe89⤵PID:1628
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651812.exeC:\Users\Admin\AppData\Local\Temp\tmp240651812.exe79⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\tmp240652562.exeC:\Users\Admin\AppData\Local\Temp\tmp240652562.exe80⤵PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652640.exeC:\Users\Admin\AppData\Local\Temp\tmp240652640.exe80⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\tmp240653171.exeC:\Users\Admin\AppData\Local\Temp\tmp240653171.exe81⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653359.exeC:\Users\Admin\AppData\Local\Temp\tmp240653359.exe81⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\tmp240653812.exeC:\Users\Admin\AppData\Local\Temp\tmp240653812.exe82⤵PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653859.exeC:\Users\Admin\AppData\Local\Temp\tmp240653859.exe82⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\tmp240654156.exeC:\Users\Admin\AppData\Local\Temp\tmp240654156.exe83⤵PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240654234.exeC:\Users\Admin\AppData\Local\Temp\tmp240654234.exe83⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\tmp240654984.exeC:\Users\Admin\AppData\Local\Temp\tmp240654984.exe84⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655046.exeC:\Users\Admin\AppData\Local\Temp\tmp240655046.exe84⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\tmp240655359.exeC:\Users\Admin\AppData\Local\Temp\tmp240655359.exe85⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655421.exeC:\Users\Admin\AppData\Local\Temp\tmp240655421.exe85⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\tmp240655578.exeC:\Users\Admin\AppData\Local\Temp\tmp240655578.exe86⤵PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655640.exeC:\Users\Admin\AppData\Local\Temp\tmp240655640.exe86⤵
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\tmp240655781.exeC:\Users\Admin\AppData\Local\Temp\tmp240655781.exe87⤵PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240655843.exeC:\Users\Admin\AppData\Local\Temp\tmp240655843.exe87⤵PID:4388
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240650875.exeC:\Users\Admin\AppData\Local\Temp\tmp240650875.exe77⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\tmp240651296.exeC:\Users\Admin\AppData\Local\Temp\tmp240651296.exe78⤵PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240651656.exeC:\Users\Admin\AppData\Local\Temp\tmp240651656.exe78⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\tmp240652281.exeC:\Users\Admin\AppData\Local\Temp\tmp240652281.exe79⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652359.exeC:\Users\Admin\AppData\Local\Temp\tmp240652359.exe79⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\tmp240652812.exeC:\Users\Admin\AppData\Local\Temp\tmp240652812.exe80⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240652906.exeC:\Users\Admin\AppData\Local\Temp\tmp240652906.exe80⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\tmp240653250.exeC:\Users\Admin\AppData\Local\Temp\tmp240653250.exe81⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653296.exeC:\Users\Admin\AppData\Local\Temp\tmp240653296.exe81⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\tmp240653718.exeC:\Users\Admin\AppData\Local\Temp\tmp240653718.exe82⤵PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240653781.exeC:\Users\Admin\AppData\Local\Temp\tmp240653781.exe82⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\tmp240654062.exeC:\Users\Admin\AppData\Local\Temp\tmp240654062.exe83⤵PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240654140.exeC:\Users\Admin\AppData\Local\Temp\tmp240654140.exe83⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\tmp240654312.exeC:\Users\Admin\AppData\Local\Temp\tmp240654312.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4756 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\tmp240656062.exeC:\Users\Admin\AppData\Local\Temp\tmp240656062.exe86⤵
- Checks computer location settings
- Modifies registry class
PID:3332 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\tmp240656812.exeC:\Users\Admin\AppData\Local\Temp\tmp240656812.exe88⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\tmp240657671.exeC:\Users\Admin\AppData\Local\Temp\tmp240657671.exe90⤵PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240657734.exeC:\Users\Admin\AppData\Local\Temp\tmp240657734.exe90⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\tmp240658187.exeC:\Users\Admin\AppData\Local\Temp\tmp240658187.exe91⤵PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240658265.exeC:\Users\Admin\AppData\Local\Temp\tmp240658265.exe91⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\tmp240659062.exeC:\Users\Admin\AppData\Local\Temp\tmp240659062.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3724 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\tmp240659937.exeC:\Users\Admin\AppData\Local\Temp\tmp240659937.exe94⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\tmp240661078.exeC:\Users\Admin\AppData\Local\Temp\tmp240661078.exe96⤵PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240661281.exeC:\Users\Admin\AppData\Local\Temp\tmp240661281.exe96⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\tmp240661968.exeC:\Users\Admin\AppData\Local\Temp\tmp240661968.exe97⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2404 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\tmp240663562.exeC:\Users\Admin\AppData\Local\Temp\tmp240663562.exe99⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240663640.exeC:\Users\Admin\AppData\Local\Temp\tmp240663640.exe99⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\tmp240664296.exeC:\Users\Admin\AppData\Local\Temp\tmp240664296.exe100⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240664359.exeC:\Users\Admin\AppData\Local\Temp\tmp240664359.exe100⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\tmp240664921.exeC:\Users\Admin\AppData\Local\Temp\tmp240664921.exe101⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240665000.exeC:\Users\Admin\AppData\Local\Temp\tmp240665000.exe101⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\tmp240665437.exeC:\Users\Admin\AppData\Local\Temp\tmp240665437.exe102⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240665500.exeC:\Users\Admin\AppData\Local\Temp\tmp240665500.exe102⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\tmp240665828.exeC:\Users\Admin\AppData\Local\Temp\tmp240665828.exe103⤵PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240665937.exeC:\Users\Admin\AppData\Local\Temp\tmp240665937.exe103⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\tmp240666281.exeC:\Users\Admin\AppData\Local\Temp\tmp240666281.exe104⤵PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240666359.exeC:\Users\Admin\AppData\Local\Temp\tmp240666359.exe104⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\tmp240666625.exeC:\Users\Admin\AppData\Local\Temp\tmp240666625.exe105⤵PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240666671.exeC:\Users\Admin\AppData\Local\Temp\tmp240666671.exe105⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\tmp240666890.exeC:\Users\Admin\AppData\Local\Temp\tmp240666890.exe106⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240666984.exeC:\Users\Admin\AppData\Local\Temp\tmp240666984.exe106⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\tmp240667265.exeC:\Users\Admin\AppData\Local\Temp\tmp240667265.exe107⤵PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240667296.exeC:\Users\Admin\AppData\Local\Temp\tmp240667296.exe107⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\tmp240667406.exeC:\Users\Admin\AppData\Local\Temp\tmp240667406.exe108⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240667437.exeC:\Users\Admin\AppData\Local\Temp\tmp240667437.exe108⤵PID:4836
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240662046.exeC:\Users\Admin\AppData\Local\Temp\tmp240662046.exe97⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\tmp240662593.exeC:\Users\Admin\AppData\Local\Temp\tmp240662593.exe98⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240662750.exeC:\Users\Admin\AppData\Local\Temp\tmp240662750.exe98⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\tmp240663296.exeC:\Users\Admin\AppData\Local\Temp\tmp240663296.exe99⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\tmp240664546.exeC:\Users\Admin\AppData\Local\Temp\tmp240664546.exe101⤵PID:4668
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240664640.exeC:\Users\Admin\AppData\Local\Temp\tmp240664640.exe101⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\tmp240665359.exeC:\Users\Admin\AppData\Local\Temp\tmp240665359.exe102⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240665453.exeC:\Users\Admin\AppData\Local\Temp\tmp240665453.exe102⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\tmp240666187.exeC:\Users\Admin\AppData\Local\Temp\tmp240666187.exe103⤵PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240666406.exeC:\Users\Admin\AppData\Local\Temp\tmp240666406.exe103⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\tmp240666781.exeC:\Users\Admin\AppData\Local\Temp\tmp240666781.exe104⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240666843.exeC:\Users\Admin\AppData\Local\Temp\tmp240666843.exe104⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\tmp240667359.exeC:\Users\Admin\AppData\Local\Temp\tmp240667359.exe105⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240667546.exeC:\Users\Admin\AppData\Local\Temp\tmp240667546.exe105⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\tmp240668000.exeC:\Users\Admin\AppData\Local\Temp\tmp240668000.exe106⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240668125.exeC:\Users\Admin\AppData\Local\Temp\tmp240668125.exe106⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\tmp240668468.exeC:\Users\Admin\AppData\Local\Temp\tmp240668468.exe107⤵PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240669203.exeC:\Users\Admin\AppData\Local\Temp\tmp240669203.exe107⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\tmp240669546.exeC:\Users\Admin\AppData\Local\Temp\tmp240669546.exe108⤵
- Checks computer location settings
- Modifies registry class
PID:2160 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\tmp240671484.exeC:\Users\Admin\AppData\Local\Temp\tmp240671484.exe110⤵
- Checks computer location settings
- Modifies registry class
PID:716 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\tmp240672296.exeC:\Users\Admin\AppData\Local\Temp\tmp240672296.exe112⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240672437.exeC:\Users\Admin\AppData\Local\Temp\tmp240672437.exe112⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\tmp240673093.exeC:\Users\Admin\AppData\Local\Temp\tmp240673093.exe113⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240673125.exeC:\Users\Admin\AppData\Local\Temp\tmp240673125.exe113⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\tmp240673625.exeC:\Users\Admin\AppData\Local\Temp\tmp240673625.exe114⤵PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240673687.exeC:\Users\Admin\AppData\Local\Temp\tmp240673687.exe114⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\tmp240674218.exeC:\Users\Admin\AppData\Local\Temp\tmp240674218.exe115⤵PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240674250.exeC:\Users\Admin\AppData\Local\Temp\tmp240674250.exe115⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\tmp240674734.exeC:\Users\Admin\AppData\Local\Temp\tmp240674734.exe116⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240674828.exeC:\Users\Admin\AppData\Local\Temp\tmp240674828.exe116⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\tmp240675265.exeC:\Users\Admin\AppData\Local\Temp\tmp240675265.exe117⤵PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240675343.exeC:\Users\Admin\AppData\Local\Temp\tmp240675343.exe117⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\tmp240675781.exeC:\Users\Admin\AppData\Local\Temp\tmp240675781.exe118⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\tmp240677546.exeC:\Users\Admin\AppData\Local\Temp\tmp240677546.exe120⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3740 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\tmp240678875.exeC:\Users\Admin\AppData\Local\Temp\tmp240678875.exe122⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4356
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-