Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe
Resource
win10v2004-20220812-en
General
-
Target
6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe
-
Size
269KB
-
MD5
52c30e5069632251e223731b54da4000
-
SHA1
d3cd1dee81f1bcf5942f8a6dbc539aca19fc56dd
-
SHA256
6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec
-
SHA512
b2b6d2180d6f2681ddaef9360a62fdb7db88a141ff28a40080cab512c51e1293e8affb05e8eeb4f477df1879b0b3c2f46c1bbec47c35e47fe7ef4771ee0430a5
-
SSDEEP
6144:oftdcNdPYNSDyDIkFthptNSDyDIkFthphNSDyDRO1thp:bdPcSDyTFtjXSDyTFtjrSDyo1tj
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2084 notpad.exe 4580 tmp240551953.exe 4808 tmp240551984.exe 4788 notpad.exe 4972 tmp240552312.exe 4684 tmp240552359.exe 4264 notpad.exe 4188 tmp240552593.exe 4344 tmp240552671.exe 724 notpad.exe 4088 tmp240552937.exe 3640 tmp240552968.exe 2088 notpad.exe 2812 tmp240553906.exe 224 notpad.exe 4548 tmp240554000.exe 2388 tmp240554234.exe 3032 tmp240554375.exe 3752 notpad.exe 3528 tmp240554656.exe 3512 tmp240554734.exe 1544 notpad.exe 4068 tmp240555031.exe 2156 tmp240555265.exe 3496 notpad.exe 3120 tmp240555578.exe 4884 tmp240555640.exe 3148 notpad.exe 2936 tmp240555843.exe 4912 tmp240555984.exe 2404 notpad.exe 2768 tmp240556250.exe 4440 tmp240556281.exe 4152 notpad.exe 3336 tmp240556484.exe 5000 tmp240556515.exe 2868 notpad.exe 2072 tmp240556718.exe 3488 tmp240556750.exe 1280 notpad.exe 4860 tmp240556968.exe 1892 tmp240557000.exe 1624 notpad.exe 2116 tmp240557203.exe 2392 tmp240557234.exe 3400 notpad.exe 1592 tmp240557437.exe 4568 tmp240557468.exe 3000 notpad.exe 3620 tmp240557671.exe 3152 tmp240557703.exe 2976 notpad.exe 3668 tmp240557937.exe 2128 tmp240557953.exe 2096 notpad.exe 4680 tmp240558187.exe 1912 tmp240558218.exe 4720 notpad.exe 4668 tmp240558390.exe 1224 tmp240558421.exe 892 notpad.exe 4184 tmp240558671.exe 4520 tmp240558687.exe 2080 notpad.exe -
resource yara_rule behavioral2/files/0x000300000001e6e8-133.dat upx behavioral2/files/0x000300000001e6e8-134.dat upx behavioral2/memory/2084-135-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000001e590-140.dat upx behavioral2/memory/2084-143-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-145.dat upx behavioral2/files/0x000700000001e590-150.dat upx behavioral2/memory/4788-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-155.dat upx behavioral2/files/0x000700000001e590-160.dat upx behavioral2/memory/4264-163-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-165.dat upx behavioral2/files/0x000700000001e590-170.dat upx behavioral2/memory/724-169-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/724-174-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-176.dat upx behavioral2/memory/2088-182-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000001e590-180.dat upx behavioral2/files/0x000300000001e6e8-184.dat upx behavioral2/memory/2088-187-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/224-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000001e590-192.dat upx behavioral2/files/0x000300000001e6e8-197.dat upx behavioral2/memory/3752-205-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000001e590-201.dat upx behavioral2/files/0x000300000001e6e8-207.dat upx behavioral2/memory/1544-208-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000001e590-213.dat upx behavioral2/memory/1544-216-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-218.dat upx behavioral2/files/0x000700000001e590-224.dat upx behavioral2/memory/3496-226-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-228.dat upx behavioral2/files/0x000700000001e590-233.dat upx behavioral2/memory/3148-236-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000300000001e6e8-238.dat upx behavioral2/memory/2404-243-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4152-247-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2868-251-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1280-255-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1280-257-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1624-260-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3400-264-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3000-268-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2976-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2096-274-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2096-277-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4720-281-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/892-285-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2080-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2252-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4880-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1148-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/896-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2644-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3656-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3656-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/512-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4244-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/368-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4244-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/368-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3700-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4920-301-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240677718.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240678531.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240680421.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240570296.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240573015.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240589234.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240668937.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation notpad.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240589000.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240601046.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240604531.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240677906.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240558671.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240573218.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240679906.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240592375.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240603875.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240556484.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240599750.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240603203.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240676515.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240552312.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240598671.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240642265.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240557937.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240572312.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240677750.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240574046.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240669187.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240670203.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240678015.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240556968.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240588093.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240669937.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240678312.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240557203.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240655000.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240672250.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240677015.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240570578.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240589437.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240605312.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240633734.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240677234.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240552593.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240646218.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240670750.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240671578.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240681890.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240559546.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240559765.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240670546.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240592046.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240597171.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240643515.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240671968.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe- tmp240571187.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240647062.exe File created C:\Windows\SysWOW64\notpad.exe tmp240680421.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240560656.exe File created C:\Windows\SysWOW64\notpad.exe tmp240570296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240571406.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240587890.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240676093.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240680421.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240558671.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240558890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240569375.exe File created C:\Windows\SysWOW64\notpad.exe tmp240604531.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240646218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240679906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240556484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240572312.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240589984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240589609.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240597171.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240605890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240671968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240679515.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240572546.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240573218.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240669578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240679703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240556250.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240556718.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240598906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240681593.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240679703.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240559546.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240573609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240589437.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240647062.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240679296.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240591609.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240603875.exe File created C:\Windows\SysWOW64\notpad.exe tmp240649984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240671578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240573015.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240602437.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240677234.exe File created C:\Windows\SysWOW64\notpad.exe tmp240551953.exe File created C:\Windows\SysWOW64\notpad.exe tmp240557937.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240589234.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600562.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240675875.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240555843.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240556968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240588312.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600312.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240552937.exe File created C:\Windows\SysWOW64\notpad.exe tmp240592046.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240679296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240679515.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240681890.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240675359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240675875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240679906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240552312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240633734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240669187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240681593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240557437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240559953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240677718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240551953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240559109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240574046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240676093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240677234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240556718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240557203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240559765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240670546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240671578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240599750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240599984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240677750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240676515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240591609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240604531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240680593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240655000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240672515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240556250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240675671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240572796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240570578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240590406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240556484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240609046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240677015.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 2084 3444 6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe 80 PID 3444 wrote to memory of 2084 3444 6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe 80 PID 3444 wrote to memory of 2084 3444 6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe 80 PID 2084 wrote to memory of 4580 2084 notpad.exe 81 PID 2084 wrote to memory of 4580 2084 notpad.exe 81 PID 2084 wrote to memory of 4580 2084 notpad.exe 81 PID 2084 wrote to memory of 4808 2084 notpad.exe 82 PID 2084 wrote to memory of 4808 2084 notpad.exe 82 PID 2084 wrote to memory of 4808 2084 notpad.exe 82 PID 4580 wrote to memory of 4788 4580 tmp240551953.exe 83 PID 4580 wrote to memory of 4788 4580 tmp240551953.exe 83 PID 4580 wrote to memory of 4788 4580 tmp240551953.exe 83 PID 4788 wrote to memory of 4972 4788 notpad.exe 84 PID 4788 wrote to memory of 4972 4788 notpad.exe 84 PID 4788 wrote to memory of 4972 4788 notpad.exe 84 PID 4788 wrote to memory of 4684 4788 notpad.exe 85 PID 4788 wrote to memory of 4684 4788 notpad.exe 85 PID 4788 wrote to memory of 4684 4788 notpad.exe 85 PID 4972 wrote to memory of 4264 4972 tmp240552312.exe 86 PID 4972 wrote to memory of 4264 4972 tmp240552312.exe 86 PID 4972 wrote to memory of 4264 4972 tmp240552312.exe 86 PID 4264 wrote to memory of 4188 4264 notpad.exe 87 PID 4264 wrote to memory of 4188 4264 notpad.exe 87 PID 4264 wrote to memory of 4188 4264 notpad.exe 87 PID 4264 wrote to memory of 4344 4264 notpad.exe 88 PID 4264 wrote to memory of 4344 4264 notpad.exe 88 PID 4264 wrote to memory of 4344 4264 notpad.exe 88 PID 4188 wrote to memory of 724 4188 tmp240552593.exe 89 PID 4188 wrote to memory of 724 4188 tmp240552593.exe 89 PID 4188 wrote to memory of 724 4188 tmp240552593.exe 89 PID 724 wrote to memory of 4088 724 notpad.exe 90 PID 724 wrote to memory of 4088 724 notpad.exe 90 PID 724 wrote to memory of 4088 724 notpad.exe 90 PID 724 wrote to memory of 3640 724 notpad.exe 91 PID 724 wrote to memory of 3640 724 notpad.exe 91 PID 724 wrote to memory of 3640 724 notpad.exe 91 PID 4088 wrote to memory of 2088 4088 tmp240552937.exe 92 PID 4088 wrote to memory of 2088 4088 tmp240552937.exe 92 PID 4088 wrote to memory of 2088 4088 tmp240552937.exe 92 PID 2088 wrote to memory of 2812 2088 notpad.exe 93 PID 2088 wrote to memory of 2812 2088 notpad.exe 93 PID 2088 wrote to memory of 2812 2088 notpad.exe 93 PID 2812 wrote to memory of 224 2812 tmp240553906.exe 94 PID 2812 wrote to memory of 224 2812 tmp240553906.exe 94 PID 2812 wrote to memory of 224 2812 tmp240553906.exe 94 PID 2088 wrote to memory of 4548 2088 notpad.exe 95 PID 2088 wrote to memory of 4548 2088 notpad.exe 95 PID 2088 wrote to memory of 4548 2088 notpad.exe 95 PID 224 wrote to memory of 2388 224 notpad.exe 96 PID 224 wrote to memory of 2388 224 notpad.exe 96 PID 224 wrote to memory of 2388 224 notpad.exe 96 PID 224 wrote to memory of 3032 224 notpad.exe 97 PID 224 wrote to memory of 3032 224 notpad.exe 97 PID 224 wrote to memory of 3032 224 notpad.exe 97 PID 2388 wrote to memory of 3752 2388 tmp240554234.exe 98 PID 2388 wrote to memory of 3752 2388 tmp240554234.exe 98 PID 2388 wrote to memory of 3752 2388 tmp240554234.exe 98 PID 3752 wrote to memory of 3528 3752 notpad.exe 99 PID 3752 wrote to memory of 3528 3752 notpad.exe 99 PID 3752 wrote to memory of 3528 3752 notpad.exe 99 PID 3752 wrote to memory of 3512 3752 notpad.exe 100 PID 3752 wrote to memory of 3512 3752 notpad.exe 100 PID 3752 wrote to memory of 3512 3752 notpad.exe 100 PID 3528 wrote to memory of 1544 3528 tmp240554656.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe"C:\Users\Admin\AppData\Local\Temp\6a1b0cbbc67c35b801fe66c3c53201142bb0e0da06353b725b111eeb5f0d1dec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\tmp240551953.exeC:\Users\Admin\AppData\Local\Temp\tmp240551953.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\tmp240552312.exeC:\Users\Admin\AppData\Local\Temp\tmp240552312.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\tmp240552593.exeC:\Users\Admin\AppData\Local\Temp\tmp240552593.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\tmp240552937.exeC:\Users\Admin\AppData\Local\Temp\tmp240552937.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\tmp240553906.exeC:\Users\Admin\AppData\Local\Temp\tmp240553906.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\tmp240554234.exeC:\Users\Admin\AppData\Local\Temp\tmp240554234.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\tmp240554656.exeC:\Users\Admin\AppData\Local\Temp\tmp240554656.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\tmp240555031.exeC:\Users\Admin\AppData\Local\Temp\tmp240555031.exe17⤵
- Executes dropped EXE
PID:4068 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\tmp240555578.exeC:\Users\Admin\AppData\Local\Temp\tmp240555578.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\tmp240555843.exeC:\Users\Admin\AppData\Local\Temp\tmp240555843.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\tmp240556250.exeC:\Users\Admin\AppData\Local\Temp\tmp240556250.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2768 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\tmp240556484.exeC:\Users\Admin\AppData\Local\Temp\tmp240556484.exe25⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\tmp240556718.exeC:\Users\Admin\AppData\Local\Temp\tmp240556718.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵
- Executes dropped EXE
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\tmp240556968.exeC:\Users\Admin\AppData\Local\Temp\tmp240556968.exe29⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:4860 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\tmp240557203.exeC:\Users\Admin\AppData\Local\Temp\tmp240557203.exe31⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:2116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵
- Executes dropped EXE
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\tmp240557437.exeC:\Users\Admin\AppData\Local\Temp\tmp240557437.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\tmp240557671.exeC:\Users\Admin\AppData\Local\Temp\tmp240557671.exe35⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\tmp240557937.exeC:\Users\Admin\AppData\Local\Temp\tmp240557937.exe37⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:3668 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵
- Executes dropped EXE
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\tmp240558187.exeC:\Users\Admin\AppData\Local\Temp\tmp240558187.exe39⤵
- Executes dropped EXE
PID:4680 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"40⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\tmp240558390.exeC:\Users\Admin\AppData\Local\Temp\tmp240558390.exe41⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\tmp240558671.exeC:\Users\Admin\AppData\Local\Temp\tmp240558671.exe43⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4184 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\tmp240558890.exeC:\Users\Admin\AppData\Local\Temp\tmp240558890.exe45⤵
- Drops file in System32 directory
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\tmp240559109.exeC:\Users\Admin\AppData\Local\Temp\tmp240559109.exe47⤵
- Modifies registry class
PID:2596 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"48⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\tmp240559328.exeC:\Users\Admin\AppData\Local\Temp\tmp240559328.exe49⤵PID:1772
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"50⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\tmp240559546.exeC:\Users\Admin\AppData\Local\Temp\tmp240559546.exe51⤵
- Checks computer location settings
- Drops file in System32 directory
PID:208 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\tmp240559765.exeC:\Users\Admin\AppData\Local\Temp\tmp240559765.exe53⤵
- Checks computer location settings
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\tmp240559953.exeC:\Users\Admin\AppData\Local\Temp\tmp240559953.exe55⤵
- Modifies registry class
PID:4072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\tmp240560187.exeC:\Users\Admin\AppData\Local\Temp\tmp240560187.exe57⤵
- Modifies registry class
PID:3836 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\tmp240560406.exeC:\Users\Admin\AppData\Local\Temp\tmp240560406.exe59⤵PID:1572
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"60⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\tmp240560656.exeC:\Users\Admin\AppData\Local\Temp\tmp240560656.exe61⤵
- Drops file in System32 directory
PID:5072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\tmp240565906.exeC:\Users\Admin\AppData\Local\Temp\tmp240565906.exe63⤵PID:4376
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\tmp240568640.exeC:\Users\Admin\AppData\Local\Temp\tmp240568640.exe65⤵PID:5044
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\tmp240569375.exeC:\Users\Admin\AppData\Local\Temp\tmp240569375.exe67⤵
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\tmp240570140.exeC:\Users\Admin\AppData\Local\Temp\tmp240570140.exe69⤵
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\tmp240570296.exeC:\Users\Admin\AppData\Local\Temp\tmp240570296.exe71⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\tmp240570578.exeC:\Users\Admin\AppData\Local\Temp\tmp240570578.exe73⤵
- Checks computer location settings
- Modifies registry class
PID:1608 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\tmp240571187.exeC:\Users\Admin\AppData\Local\Temp\tmp240571187.exe75⤵
- Drops file in System32 directory
PID:5092 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\tmp240571359.exeC:\Users\Admin\AppData\Local\Temp\tmp240571359.exe77⤵PID:2680
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\tmp240571671.exeC:\Users\Admin\AppData\Local\Temp\tmp240571671.exe79⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240572171.exeC:\Users\Admin\AppData\Local\Temp\tmp240572171.exe79⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\tmp240572218.exeC:\Users\Admin\AppData\Local\Temp\tmp240572218.exe80⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240572250.exeC:\Users\Admin\AppData\Local\Temp\tmp240572250.exe80⤵PID:2888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240571375.exeC:\Users\Admin\AppData\Local\Temp\tmp240571375.exe77⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\tmp240571406.exeC:\Users\Admin\AppData\Local\Temp\tmp240571406.exe78⤵
- Drops file in System32 directory
PID:3480 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\tmp240572312.exeC:\Users\Admin\AppData\Local\Temp\tmp240572312.exe80⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4748 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\tmp240572546.exeC:\Users\Admin\AppData\Local\Temp\tmp240572546.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:3760 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\tmp240572796.exeC:\Users\Admin\AppData\Local\Temp\tmp240572796.exe84⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\tmp240573015.exeC:\Users\Admin\AppData\Local\Temp\tmp240573015.exe86⤵
- Checks computer location settings
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\tmp240573218.exeC:\Users\Admin\AppData\Local\Temp\tmp240573218.exe88⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\tmp240573609.exeC:\Users\Admin\AppData\Local\Temp\tmp240573609.exe90⤵
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\tmp240573828.exeC:\Users\Admin\AppData\Local\Temp\tmp240573828.exe92⤵PID:4300
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\tmp240574046.exeC:\Users\Admin\AppData\Local\Temp\tmp240574046.exe94⤵
- Checks computer location settings
- Modifies registry class
PID:3096 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\tmp240587406.exeC:\Users\Admin\AppData\Local\Temp\tmp240587406.exe96⤵PID:1040
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\tmp240587890.exeC:\Users\Admin\AppData\Local\Temp\tmp240587890.exe98⤵
- Drops file in System32 directory
PID:4064 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\tmp240588093.exeC:\Users\Admin\AppData\Local\Temp\tmp240588093.exe100⤵
- Checks computer location settings
- Modifies registry class
PID:384 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\tmp240588312.exeC:\Users\Admin\AppData\Local\Temp\tmp240588312.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:3652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\tmp240588718.exeC:\Users\Admin\AppData\Local\Temp\tmp240588718.exe104⤵PID:5052
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\tmp240589000.exeC:\Users\Admin\AppData\Local\Temp\tmp240589000.exe106⤵
- Checks computer location settings
- Modifies registry class
PID:1488 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\tmp240589234.exeC:\Users\Admin\AppData\Local\Temp\tmp240589234.exe108⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\tmp240589531.exeC:\Users\Admin\AppData\Local\Temp\tmp240589531.exe110⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589609.exeC:\Users\Admin\AppData\Local\Temp\tmp240589609.exe110⤵PID:2016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589250.exeC:\Users\Admin\AppData\Local\Temp\tmp240589250.exe108⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\tmp240589281.exeC:\Users\Admin\AppData\Local\Temp\tmp240589281.exe109⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589343.exeC:\Users\Admin\AppData\Local\Temp\tmp240589343.exe109⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\tmp240589437.exeC:\Users\Admin\AppData\Local\Temp\tmp240589437.exe110⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4692 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:788
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589468.exeC:\Users\Admin\AppData\Local\Temp\tmp240589468.exe110⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\tmp240589515.exeC:\Users\Admin\AppData\Local\Temp\tmp240589515.exe111⤵PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589578.exeC:\Users\Admin\AppData\Local\Temp\tmp240589578.exe111⤵PID:2080
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589156.exeC:\Users\Admin\AppData\Local\Temp\tmp240589156.exe106⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\tmp240589187.exeC:\Users\Admin\AppData\Local\Temp\tmp240589187.exe107⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589218.exeC:\Users\Admin\AppData\Local\Temp\tmp240589218.exe107⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\tmp240589484.exeC:\Users\Admin\AppData\Local\Temp\tmp240589484.exe108⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240589500.exeC:\Users\Admin\AppData\Local\Temp\tmp240589500.exe108⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\tmp240589609.exeC:\Users\Admin\AppData\Local\Temp\tmp240589609.exe109⤵
- Drops file in System32 directory
PID:2436 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"110⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\tmp240589984.exeC:\Users\Admin\AppData\Local\Temp\tmp240589984.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\tmp240590421.exeC:\Users\Admin\AppData\Local\Temp\tmp240590421.exe113⤵PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590484.exeC:\Users\Admin\AppData\Local\Temp\tmp240590484.exe113⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\tmp240590531.exeC:\Users\Admin\AppData\Local\Temp\tmp240590531.exe114⤵PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590546.exeC:\Users\Admin\AppData\Local\Temp\tmp240590546.exe114⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\tmp240590578.exeC:\Users\Admin\AppData\Local\Temp\tmp240590578.exe115⤵PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590593.exeC:\Users\Admin\AppData\Local\Temp\tmp240590593.exe115⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\tmp240590640.exeC:\Users\Admin\AppData\Local\Temp\tmp240590640.exe116⤵PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590656.exeC:\Users\Admin\AppData\Local\Temp\tmp240590656.exe116⤵PID:3408
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590234.exeC:\Users\Admin\AppData\Local\Temp\tmp240590234.exe111⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\tmp240590265.exeC:\Users\Admin\AppData\Local\Temp\tmp240590265.exe112⤵PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590296.exeC:\Users\Admin\AppData\Local\Temp\tmp240590296.exe112⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\tmp240590343.exeC:\Users\Admin\AppData\Local\Temp\tmp240590343.exe113⤵PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240590375.exeC:\Users\Admin\AppData\Local\Temp\tmp240590375.exe113⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\tmp240590406.exeC:\Users\Admin\AppData\Local\Temp\tmp240590406.exe114⤵
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\tmp240590625.exeC:\Users\Admin\AppData\Local\Temp\tmp240590625.exe116⤵PID:4500
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\tmp240591390.exeC:\Users\Admin\AppData\Local\Temp\tmp240591390.exe118⤵PID:1756
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\tmp240591625.exeC:\Users\Admin\AppData\Local\Temp\tmp240591625.exe120⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240591968.exeC:\Users\Admin\AppData\Local\Temp\tmp240591968.exe120⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\tmp240592000.exeC:\Users\Admin\AppData\Local\Temp\tmp240592000.exe121⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240592015.exeC:\Users\Admin\AppData\Local\Temp\tmp240592015.exe121⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\tmp240592046.exeC:\Users\Admin\AppData\Local\Temp\tmp240592046.exe122⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-