Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe
Resource
win10v2004-20220901-en
General
-
Target
a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe
-
Size
579KB
-
MD5
5f89434ec56e54c7c86733d5ba608730
-
SHA1
f4315d053ad421d886b4b8616395a92ef6e4a052
-
SHA256
a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd
-
SHA512
9dd62c0c598ab9b63b0a235c5a5e33e0c0e19dae147a8c290f84df4731e270bd4634d9ee561c915f0b619616e07428e1e6fe10b95ac8909344fab740aea1ae49
-
SSDEEP
12288:vR9PUPhR9PgPhR9P9PhR9PGPhR9PePhR9PuPhR9PoPNR9P5SDyTFtj:vRYRgRJRWRSRmRIRCDyTFtj
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4360 notpad.exe 1168 tmp240560875.exe 3140 notpad.exe 1280 tmp240562000.exe 1592 tmp240560953.exe 220 notpad.exe 208 tmp240562906.exe 856 tmp240563140.exe 2596 tmp240563359.exe 4536 notpad.exe 3548 tmp240563656.exe 4992 tmp240563734.exe 3024 notpad.exe 560 tmp240564046.exe 4696 notpad.exe 5104 tmp240564562.exe 5116 tmp240564156.exe 1500 tmp240564937.exe 1436 notpad.exe 2140 tmp240565437.exe 1204 tmp240565484.exe 4760 notpad.exe 4692 tmp240565828.exe 4932 tmp240565859.exe 824 notpad.exe 2076 tmp240566156.exe 3068 tmp240566187.exe 1036 notpad.exe 468 tmp240566484.exe 3816 tmp240566546.exe 4596 notpad.exe 2916 tmp240566875.exe 1332 tmp240566937.exe 2112 notpad.exe 2956 tmp240567328.exe 3124 tmp240567359.exe 3684 notpad.exe 3988 tmp240567593.exe 4768 tmp240567640.exe 4544 notpad.exe 4960 tmp240567921.exe 5024 tmp240568687.exe 4284 notpad.exe 3188 notpad.exe 2072 tmp240569187.exe 3724 tmp240569218.exe 2572 tmp240569265.exe 3460 tmp240569296.exe 1584 notpad.exe 3792 tmp240569515.exe 744 tmp240569578.exe 4604 tmp240569687.exe 3680 tmp240569750.exe 4560 notpad.exe 4232 tmp240569828.exe 1880 tmp240569859.exe 332 tmp240569953.exe 3820 tmp240569984.exe 1732 notpad.exe 3128 tmp240570078.exe 1100 tmp240570171.exe 4720 tmp240570265.exe 3024 notpad.exe 3428 tmp240570343.exe -
resource yara_rule behavioral2/files/0x0004000000022dd8-133.dat upx behavioral2/files/0x0004000000022dd8-134.dat upx behavioral2/memory/4360-135-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022daf-139.dat upx behavioral2/files/0x0004000000022dd8-142.dat upx behavioral2/memory/3140-150-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4360-151-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022daf-148.dat upx behavioral2/files/0x0004000000022dd8-153.dat upx behavioral2/memory/3140-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022daf-160.dat upx behavioral2/memory/220-164-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022dd8-166.dat upx behavioral2/files/0x0004000000022daf-170.dat upx behavioral2/memory/4536-174-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022dd8-176.dat upx behavioral2/files/0x0004000000022daf-180.dat upx behavioral2/files/0x0004000000022dd8-183.dat upx behavioral2/memory/3024-190-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4696-193-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4696-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022daf-191.dat upx behavioral2/files/0x0004000000022dd8-197.dat upx behavioral2/memory/1436-205-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022daf-202.dat upx behavioral2/files/0x0004000000022dd8-207.dat upx behavioral2/files/0x0004000000022daf-211.dat upx behavioral2/memory/4760-215-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022dd8-217.dat upx behavioral2/memory/824-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022daf-222.dat upx behavioral2/files/0x0004000000022dd8-227.dat upx behavioral2/files/0x0004000000022daf-232.dat upx behavioral2/memory/1036-235-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0004000000022dd8-237.dat upx behavioral2/memory/4596-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2112-246-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3684-250-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4544-252-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4544-255-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4284-257-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3188-261-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3724-264-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1584-268-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/744-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4560-275-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1880-278-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1732-281-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1732-283-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1100-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3024-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2948-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4272-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1204-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4244-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/396-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3020-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3020-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4516-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2528-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1276-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2436-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1932-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3532-301-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240577125.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240582703.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240597109.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580890.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240560875.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240567921.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240614468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587140.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240611953.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240612656.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240596859.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240588250.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240617281.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579484.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240569515.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587437.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240578171.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580109.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240582296.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585000.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240585796.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240589296.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240615875.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240612531.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240590890.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240589515.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240598296.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240616343.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240579812.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240602171.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240565437.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240580671.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240586937.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240564046.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240562000.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240596000.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240606890.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240598640.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240606375.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe tmp240560875.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240565437.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240591109.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240596578.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240606171.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240564046.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240571578.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240573156.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240581734.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240597921.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240616765.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240589843.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240585265.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240576875.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240590625.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240563656.exe File created C:\Windows\SysWOW64\notpad.exe tmp240595343.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240596000.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240578171.exe File created C:\Windows\SysWOW64\notpad.exe tmp240616343.exe File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File created C:\Windows\SysWOW64\notpad.exe tmp240585796.exe File created C:\Windows\SysWOW64\notpad.exe tmp240568968.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240604031.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240563140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240569828.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240571250.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240577406.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240590296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240568968.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240581734.exe File created C:\Windows\SysWOW64\notpad.exe tmp240582703.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240597109.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240595343.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240577406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240607281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240582296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240565828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240607593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240580343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240583031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240594281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240613796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240604031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240569187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240586656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240611953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240587437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240571250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240564046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4360 4656 a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe 83 PID 4656 wrote to memory of 4360 4656 a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe 83 PID 4656 wrote to memory of 4360 4656 a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe 83 PID 4360 wrote to memory of 1168 4360 notpad.exe 84 PID 4360 wrote to memory of 1168 4360 notpad.exe 84 PID 4360 wrote to memory of 1168 4360 notpad.exe 84 PID 1168 wrote to memory of 3140 1168 tmp240560875.exe 86 PID 1168 wrote to memory of 3140 1168 tmp240560875.exe 86 PID 1168 wrote to memory of 3140 1168 tmp240560875.exe 86 PID 4360 wrote to memory of 1592 4360 notpad.exe 85 PID 4360 wrote to memory of 1592 4360 notpad.exe 85 PID 4360 wrote to memory of 1592 4360 notpad.exe 85 PID 3140 wrote to memory of 1280 3140 notpad.exe 87 PID 3140 wrote to memory of 1280 3140 notpad.exe 87 PID 3140 wrote to memory of 1280 3140 notpad.exe 87 PID 1280 wrote to memory of 220 1280 tmp240562000.exe 88 PID 1280 wrote to memory of 220 1280 tmp240562000.exe 88 PID 1280 wrote to memory of 220 1280 tmp240562000.exe 88 PID 3140 wrote to memory of 208 3140 notpad.exe 89 PID 3140 wrote to memory of 208 3140 notpad.exe 89 PID 3140 wrote to memory of 208 3140 notpad.exe 89 PID 220 wrote to memory of 856 220 notpad.exe 90 PID 220 wrote to memory of 856 220 notpad.exe 90 PID 220 wrote to memory of 856 220 notpad.exe 90 PID 220 wrote to memory of 2596 220 notpad.exe 91 PID 220 wrote to memory of 2596 220 notpad.exe 91 PID 220 wrote to memory of 2596 220 notpad.exe 91 PID 856 wrote to memory of 4536 856 tmp240563140.exe 92 PID 856 wrote to memory of 4536 856 tmp240563140.exe 92 PID 856 wrote to memory of 4536 856 tmp240563140.exe 92 PID 4536 wrote to memory of 3548 4536 notpad.exe 93 PID 4536 wrote to memory of 3548 4536 notpad.exe 93 PID 4536 wrote to memory of 3548 4536 notpad.exe 93 PID 4536 wrote to memory of 4992 4536 notpad.exe 94 PID 4536 wrote to memory of 4992 4536 notpad.exe 94 PID 4536 wrote to memory of 4992 4536 notpad.exe 94 PID 3548 wrote to memory of 3024 3548 tmp240563656.exe 95 PID 3548 wrote to memory of 3024 3548 tmp240563656.exe 95 PID 3548 wrote to memory of 3024 3548 tmp240563656.exe 95 PID 3024 wrote to memory of 560 3024 notpad.exe 96 PID 3024 wrote to memory of 560 3024 notpad.exe 96 PID 3024 wrote to memory of 560 3024 notpad.exe 96 PID 560 wrote to memory of 4696 560 tmp240564046.exe 97 PID 560 wrote to memory of 4696 560 tmp240564046.exe 97 PID 560 wrote to memory of 4696 560 tmp240564046.exe 97 PID 3024 wrote to memory of 5116 3024 notpad.exe 99 PID 3024 wrote to memory of 5116 3024 notpad.exe 99 PID 3024 wrote to memory of 5116 3024 notpad.exe 99 PID 4696 wrote to memory of 5104 4696 notpad.exe 98 PID 4696 wrote to memory of 5104 4696 notpad.exe 98 PID 4696 wrote to memory of 5104 4696 notpad.exe 98 PID 4696 wrote to memory of 1500 4696 notpad.exe 100 PID 4696 wrote to memory of 1500 4696 notpad.exe 100 PID 4696 wrote to memory of 1500 4696 notpad.exe 100 PID 5104 wrote to memory of 1436 5104 tmp240564562.exe 101 PID 5104 wrote to memory of 1436 5104 tmp240564562.exe 101 PID 5104 wrote to memory of 1436 5104 tmp240564562.exe 101 PID 1436 wrote to memory of 2140 1436 notpad.exe 102 PID 1436 wrote to memory of 2140 1436 notpad.exe 102 PID 1436 wrote to memory of 2140 1436 notpad.exe 102 PID 1436 wrote to memory of 1204 1436 notpad.exe 103 PID 1436 wrote to memory of 1204 1436 notpad.exe 103 PID 1436 wrote to memory of 1204 1436 notpad.exe 103 PID 2140 wrote to memory of 4760 2140 tmp240565437.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe"C:\Users\Admin\AppData\Local\Temp\a624bc965a5b1ba69587cdf4f665d7c439becc6b8f2f20b8004c238be5f4b3cd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\tmp240560875.exeC:\Users\Admin\AppData\Local\Temp\tmp240560875.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\tmp240562000.exeC:\Users\Admin\AppData\Local\Temp\tmp240562000.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\tmp240563140.exeC:\Users\Admin\AppData\Local\Temp\tmp240563140.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\tmp240563656.exeC:\Users\Admin\AppData\Local\Temp\tmp240563656.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\tmp240564046.exeC:\Users\Admin\AppData\Local\Temp\tmp240564046.exe11⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\tmp240564562.exeC:\Users\Admin\AppData\Local\Temp\tmp240564562.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\tmp240565437.exeC:\Users\Admin\AppData\Local\Temp\tmp240565437.exe15⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\tmp240565828.exeC:\Users\Admin\AppData\Local\Temp\tmp240565828.exe17⤵
- Executes dropped EXE
- Modifies registry class
PID:4692 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\tmp240566156.exeC:\Users\Admin\AppData\Local\Temp\tmp240566156.exe19⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\tmp240566484.exeC:\Users\Admin\AppData\Local\Temp\tmp240566484.exe21⤵
- Executes dropped EXE
PID:468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\tmp240566875.exeC:\Users\Admin\AppData\Local\Temp\tmp240566875.exe23⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\tmp240567328.exeC:\Users\Admin\AppData\Local\Temp\tmp240567328.exe25⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵
- Executes dropped EXE
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\tmp240567593.exeC:\Users\Admin\AppData\Local\Temp\tmp240567593.exe27⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\tmp240567921.exeC:\Users\Admin\AppData\Local\Temp\tmp240567921.exe29⤵
- Executes dropped EXE
- Checks computer location settings
PID:4960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\tmp240568968.exeC:\Users\Admin\AppData\Local\Temp\tmp240568968.exe31⤵
- Drops file in System32 directory
PID:828 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\tmp240569187.exeC:\Users\Admin\AppData\Local\Temp\tmp240569187.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\tmp240569515.exeC:\Users\Admin\AppData\Local\Temp\tmp240569515.exe35⤵
- Executes dropped EXE
- Checks computer location settings
PID:3792 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵
- Executes dropped EXE
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\tmp240569828.exeC:\Users\Admin\AppData\Local\Temp\tmp240569828.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4232 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\tmp240570078.exeC:\Users\Admin\AppData\Local\Temp\tmp240570078.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:3128 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"40⤵
- Executes dropped EXE
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\tmp240570375.exeC:\Users\Admin\AppData\Local\Temp\tmp240570375.exe41⤵PID:3440
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\tmp240570640.exeC:\Users\Admin\AppData\Local\Temp\tmp240570640.exe43⤵PID:3728
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\tmp240570906.exeC:\Users\Admin\AppData\Local\Temp\tmp240570906.exe45⤵
- Modifies registry class
PID:4352 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\tmp240571250.exeC:\Users\Admin\AppData\Local\Temp\tmp240571250.exe47⤵
- Drops file in System32 directory
- Modifies registry class
PID:4004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"48⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\tmp240571578.exeC:\Users\Admin\AppData\Local\Temp\tmp240571578.exe49⤵
- Drops file in System32 directory
PID:4952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"50⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\tmp240571937.exeC:\Users\Admin\AppData\Local\Temp\tmp240571937.exe51⤵PID:780
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\tmp240572156.exeC:\Users\Admin\AppData\Local\Temp\tmp240572156.exe53⤵PID:2956
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\tmp240572500.exeC:\Users\Admin\AppData\Local\Temp\tmp240572500.exe55⤵
- Modifies registry class
PID:3988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\tmp240572921.exeC:\Users\Admin\AppData\Local\Temp\tmp240572921.exe57⤵PID:648
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\tmp240573156.exeC:\Users\Admin\AppData\Local\Temp\tmp240573156.exe59⤵
- Drops file in System32 directory
PID:336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"60⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\tmp240573484.exeC:\Users\Admin\AppData\Local\Temp\tmp240573484.exe61⤵PID:228
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\tmp240576640.exeC:\Users\Admin\AppData\Local\Temp\tmp240576640.exe63⤵PID:4868
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\tmp240576875.exeC:\Users\Admin\AppData\Local\Temp\tmp240576875.exe65⤵
- Drops file in System32 directory
PID:852 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\tmp240577125.exeC:\Users\Admin\AppData\Local\Temp\tmp240577125.exe67⤵
- Checks computer location settings
PID:4180 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\tmp240577406.exeC:\Users\Admin\AppData\Local\Temp\tmp240577406.exe69⤵
- Drops file in System32 directory
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\tmp240577625.exeC:\Users\Admin\AppData\Local\Temp\tmp240577625.exe71⤵PID:1560
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:504
-
C:\Users\Admin\AppData\Local\Temp\tmp240577937.exeC:\Users\Admin\AppData\Local\Temp\tmp240577937.exe73⤵PID:4504
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\tmp240578171.exeC:\Users\Admin\AppData\Local\Temp\tmp240578171.exe75⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\tmp240578390.exeC:\Users\Admin\AppData\Local\Temp\tmp240578390.exe77⤵PID:1932
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\tmp240579484.exeC:\Users\Admin\AppData\Local\Temp\tmp240579484.exe79⤵
- Checks computer location settings
PID:3080 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\tmp240579812.exeC:\Users\Admin\AppData\Local\Temp\tmp240579812.exe81⤵
- Checks computer location settings
PID:3912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\tmp240580109.exeC:\Users\Admin\AppData\Local\Temp\tmp240580109.exe83⤵
- Checks computer location settings
- Modifies registry class
PID:4920 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\tmp240580343.exeC:\Users\Admin\AppData\Local\Temp\tmp240580343.exe85⤵
- Modifies registry class
PID:4264 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\tmp240580671.exeC:\Users\Admin\AppData\Local\Temp\tmp240580671.exe87⤵
- Checks computer location settings
- Modifies registry class
PID:4604 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\tmp240580890.exeC:\Users\Admin\AppData\Local\Temp\tmp240580890.exe89⤵
- Checks computer location settings
PID:4224 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\tmp240581171.exeC:\Users\Admin\AppData\Local\Temp\tmp240581171.exe91⤵PID:3148
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"92⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\tmp240581531.exeC:\Users\Admin\AppData\Local\Temp\tmp240581531.exe93⤵PID:4184
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"94⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\tmp240581734.exeC:\Users\Admin\AppData\Local\Temp\tmp240581734.exe95⤵
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\tmp240582031.exeC:\Users\Admin\AppData\Local\Temp\tmp240582031.exe97⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\tmp240582046.exeC:\Users\Admin\AppData\Local\Temp\tmp240582046.exe98⤵PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240582078.exeC:\Users\Admin\AppData\Local\Temp\tmp240582078.exe98⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240582015.exeC:\Users\Admin\AppData\Local\Temp\tmp240582015.exe97⤵PID:3948
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\tmp240582312.exeC:\Users\Admin\AppData\Local\Temp\tmp240582312.exe99⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\tmp240582343.exeC:\Users\Admin\AppData\Local\Temp\tmp240582343.exe100⤵PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240582375.exeC:\Users\Admin\AppData\Local\Temp\tmp240582375.exe100⤵PID:3124
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240582296.exeC:\Users\Admin\AppData\Local\Temp\tmp240582296.exe99⤵
- Checks computer location settings
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\tmp240582703.exeC:\Users\Admin\AppData\Local\Temp\tmp240582703.exe101⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3424 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\tmp240582984.exeC:\Users\Admin\AppData\Local\Temp\tmp240582984.exe103⤵
- Modifies registry class
PID:3120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\tmp240583203.exeC:\Users\Admin\AppData\Local\Temp\tmp240583203.exe105⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240584765.exeC:\Users\Admin\AppData\Local\Temp\tmp240584765.exe105⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\tmp240584828.exeC:\Users\Admin\AppData\Local\Temp\tmp240584828.exe106⤵PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240584937.exeC:\Users\Admin\AppData\Local\Temp\tmp240584937.exe106⤵PID:4304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240583000.exeC:\Users\Admin\AppData\Local\Temp\tmp240583000.exe103⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\tmp240583031.exeC:\Users\Admin\AppData\Local\Temp\tmp240583031.exe104⤵
- Modifies registry class
PID:4788 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\tmp240585000.exeC:\Users\Admin\AppData\Local\Temp\tmp240585000.exe106⤵
- Checks computer location settings
PID:3880 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\tmp240585265.exeC:\Users\Admin\AppData\Local\Temp\tmp240585265.exe108⤵
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\tmp240585546.exeC:\Users\Admin\AppData\Local\Temp\tmp240585546.exe110⤵PID:3784
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\tmp240585796.exeC:\Users\Admin\AppData\Local\Temp\tmp240585796.exe112⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4372 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\tmp240586062.exeC:\Users\Admin\AppData\Local\Temp\tmp240586062.exe114⤵PID:4080
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\tmp240586281.exeC:\Users\Admin\AppData\Local\Temp\tmp240586281.exe116⤵PID:3712
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\tmp240586656.exeC:\Users\Admin\AppData\Local\Temp\tmp240586656.exe118⤵
- Modifies registry class
PID:4000 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\tmp240586937.exeC:\Users\Admin\AppData\Local\Temp\tmp240586937.exe120⤵
- Checks computer location settings
PID:2344 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\tmp240587140.exeC:\Users\Admin\AppData\Local\Temp\tmp240587140.exe122⤵
- Checks computer location settings
PID:1424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-