Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 15:49
Behavioral task
behavioral1
Sample
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe
Resource
win10v2004-20220812-en
General
-
Target
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe
-
Size
417KB
-
MD5
0d11186c3f51c46ed8f1899275cb5eb6
-
SHA1
00dc60a9fcc6cd3241984b7f4f62a39143b56608
-
SHA256
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f
-
SHA512
84e2ee4b4079fdd2606e0ea3532120ab876262165ac2346c778abb89fe771c0c696ffd568025c01316fd18c8e7fae896f118f62c8ada45629da796d0cae6e09c
-
SSDEEP
6144:HPOXhCRhrDPePOXhCRhrDPuPOXhCRhrDPGJDJ:HPhR9PePhR9PuPhR9PGJDJ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2288 tmp240550468.exe 2456 tmp240550500.exe 1692 tmp240550593.exe 2224 tmp240550625.exe 1792 tmp240550890.exe 3280 tmp240551281.exe 3688 notpad.exe 1040 tmp240552062.exe 1152 tmp240552109.exe 3520 notpad.exe 4576 tmp240552328.exe 5088 tmp240552375.exe 1280 notpad.exe 3340 tmp240552593.exe 4716 tmp240553703.exe 4368 notpad.exe 1640 tmp240553906.exe 1916 tmp240553921.exe 1576 notpad.exe 1912 tmp240554140.exe 952 tmp240554156.exe 1704 notpad.exe 3212 tmp240554421.exe 4984 tmp240554468.exe 4416 notpad.exe 1116 tmp240554703.exe 4292 tmp240554718.exe 3240 notpad.exe 3672 tmp240554859.exe 3716 tmp240554875.exe 4816 notpad.exe 3856 tmp240555000.exe 2916 tmp240555031.exe 4224 notpad.exe 4088 tmp240555187.exe 4448 tmp240555203.exe 2812 notpad.exe 1724 tmp240555343.exe 1688 tmp240555375.exe 2280 notpad.exe 3016 tmp240555515.exe 3568 tmp240555531.exe 3132 notpad.exe 2800 tmp240555656.exe 3000 tmp240555671.exe 3076 notpad.exe 1992 tmp240555796.exe 3424 tmp240555812.exe 4660 notpad.exe 4052 tmp240555937.exe 8 tmp240555953.exe 1512 notpad.exe 3888 tmp240556125.exe 632 tmp240556140.exe 1764 notpad.exe 2856 tmp240556421.exe 2880 tmp240556500.exe 4960 notpad.exe 5016 tmp240556750.exe 2764 tmp240556796.exe 3464 notpad.exe 1192 tmp240557031.exe 3912 tmp240557046.exe 3916 notpad.exe -
resource yara_rule behavioral2/memory/3836-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0009000000022dd4-137.dat upx behavioral2/files/0x0009000000022dd4-138.dat upx behavioral2/files/0x0007000000022de9-143.dat upx behavioral2/files/0x0007000000022de9-144.dat upx behavioral2/memory/2456-145-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2224-146-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2224-152-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3836-154-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df9-156.dat upx behavioral2/files/0x0008000000022df9-157.dat upx behavioral2/memory/3688-165-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df2-162.dat upx behavioral2/files/0x0008000000022df9-168.dat upx behavioral2/memory/3520-176-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df2-172.dat upx behavioral2/files/0x0008000000022df9-178.dat upx behavioral2/memory/1280-179-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df2-183.dat upx behavioral2/memory/1280-187-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df9-189.dat upx behavioral2/memory/4368-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df2-193.dat upx behavioral2/files/0x0008000000022df9-199.dat upx behavioral2/files/0x0008000000022df2-204.dat upx behavioral2/memory/1576-207-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df9-209.dat upx behavioral2/files/0x0008000000022df2-213.dat upx behavioral2/memory/1704-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df9-219.dat upx behavioral2/files/0x0008000000022df2-224.dat upx behavioral2/memory/4416-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3240-237-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4816-244-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000022df9-239.dat upx behavioral2/files/0x0008000000022df2-234.dat upx behavioral2/files/0x0008000000022df9-229.dat upx behavioral2/memory/4224-248-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2812-252-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2280-256-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3132-260-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3076-264-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4660-268-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1512-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1764-276-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4960-280-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3464-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3916-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4140-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4964-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/788-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5108-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2128-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1560-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3540-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3540-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2560-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1620-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1576-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1524-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2904-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3732-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3720-301-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2416-302-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240556750.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240561062.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240562890.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240563109.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240601187.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240554140.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240554421.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240557703.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240562015.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240602546.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240602734.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240555187.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240556421.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240594250.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240597906.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240601390.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240562359.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240593484.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240598140.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240596312.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240557953.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240560000.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240560890.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240561843.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240563812.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240593671.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240555000.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240593859.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240594046.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240596484.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240602359.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240555796.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240559562.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240563359.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240602921.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240603125.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240553906.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240562203.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240594859.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240595265.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240595781.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240600812.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240600421.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240601546.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240555937.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240559093.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240562562.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240562765.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240594468.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240596687.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240594671.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240600984.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240552062.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240554703.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240555656.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240559781.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240592843.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240593031.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240600609.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240601937.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240552328.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240554859.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240556125.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation tmp240557484.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240593859.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240593859.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240594671.exe File created C:\Windows\SysWOW64\notpad.exe tmp240601390.exe File created C:\Windows\SysWOW64\notpad.exe tmp240555656.exe File created C:\Windows\SysWOW64\notpad.exe tmp240563109.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240561843.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240562203.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240593281.exe File created C:\Windows\SysWOW64\notpad.exe tmp240600234.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240600609.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240602921.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240554421.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240555343.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240562203.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240563812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240556421.exe File created C:\Windows\SysWOW64\notpad.exe tmp240558140.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240593031.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240602156.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240555187.exe File created C:\Windows\SysWOW64\notpad.exe tmp240563625.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240597312.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240598484.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240600812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240603125.exe File created C:\Windows\SysWOW64\notpad.exe tmp240560890.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240562765.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240561843.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240595500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240598140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240598906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240601750.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240602156.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240552593.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240553906.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240561062.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240562203.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240592843.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240597906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240553906.exe File created C:\Windows\SysWOW64\notpad.exe tmp240560250.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240603125.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240555937.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240561265.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240598484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600234.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600812.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240601546.exe File created C:\Windows\SysWOW64\notpad.exe tmp240557031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240594046.exe File created C:\Windows\SysWOW64\notpad.exe tmp240557484.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240558859.exe File created C:\Windows\SysWOW64\notpad.exe tmp240560000.exe File created C:\Windows\SysWOW64\notpad.exe tmp240561843.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240562359.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240602546.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240556125.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240557484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240602734.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240558140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240559093.exe File created C:\Windows\SysWOW64\notpad.exe tmp240562765.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp240594671.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4704 3280 WerFault.exe 81 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240559562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240594859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240563359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240552062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240557031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240556750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240561265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595046.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240553906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240557484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240561843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240554703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240557953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240554140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240557703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240550468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240592843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240556421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240558265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240560000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240562562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240594250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240552328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240555343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240556125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240561062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240563109.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2288 3836 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 76 PID 3836 wrote to memory of 2288 3836 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 76 PID 3836 wrote to memory of 2288 3836 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 76 PID 3836 wrote to memory of 2456 3836 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 77 PID 3836 wrote to memory of 2456 3836 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 77 PID 3836 wrote to memory of 2456 3836 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 77 PID 2456 wrote to memory of 1692 2456 tmp240550500.exe 78 PID 2456 wrote to memory of 1692 2456 tmp240550500.exe 78 PID 2456 wrote to memory of 1692 2456 tmp240550500.exe 78 PID 2456 wrote to memory of 2224 2456 tmp240550500.exe 79 PID 2456 wrote to memory of 2224 2456 tmp240550500.exe 79 PID 2456 wrote to memory of 2224 2456 tmp240550500.exe 79 PID 2224 wrote to memory of 1792 2224 tmp240550625.exe 80 PID 2224 wrote to memory of 1792 2224 tmp240550625.exe 80 PID 2224 wrote to memory of 1792 2224 tmp240550625.exe 80 PID 2224 wrote to memory of 3280 2224 tmp240550625.exe 81 PID 2224 wrote to memory of 3280 2224 tmp240550625.exe 81 PID 2224 wrote to memory of 3280 2224 tmp240550625.exe 81 PID 2288 wrote to memory of 3688 2288 tmp240550468.exe 85 PID 2288 wrote to memory of 3688 2288 tmp240550468.exe 85 PID 2288 wrote to memory of 3688 2288 tmp240550468.exe 85 PID 3688 wrote to memory of 1040 3688 notpad.exe 86 PID 3688 wrote to memory of 1040 3688 notpad.exe 86 PID 3688 wrote to memory of 1040 3688 notpad.exe 86 PID 3688 wrote to memory of 1152 3688 notpad.exe 87 PID 3688 wrote to memory of 1152 3688 notpad.exe 87 PID 3688 wrote to memory of 1152 3688 notpad.exe 87 PID 1040 wrote to memory of 3520 1040 tmp240552062.exe 88 PID 1040 wrote to memory of 3520 1040 tmp240552062.exe 88 PID 1040 wrote to memory of 3520 1040 tmp240552062.exe 88 PID 3520 wrote to memory of 4576 3520 notpad.exe 89 PID 3520 wrote to memory of 4576 3520 notpad.exe 89 PID 3520 wrote to memory of 4576 3520 notpad.exe 89 PID 3520 wrote to memory of 5088 3520 notpad.exe 90 PID 3520 wrote to memory of 5088 3520 notpad.exe 90 PID 3520 wrote to memory of 5088 3520 notpad.exe 90 PID 4576 wrote to memory of 1280 4576 tmp240552328.exe 91 PID 4576 wrote to memory of 1280 4576 tmp240552328.exe 91 PID 4576 wrote to memory of 1280 4576 tmp240552328.exe 91 PID 1280 wrote to memory of 3340 1280 notpad.exe 92 PID 1280 wrote to memory of 3340 1280 notpad.exe 92 PID 1280 wrote to memory of 3340 1280 notpad.exe 92 PID 1280 wrote to memory of 4716 1280 notpad.exe 93 PID 1280 wrote to memory of 4716 1280 notpad.exe 93 PID 1280 wrote to memory of 4716 1280 notpad.exe 93 PID 3340 wrote to memory of 4368 3340 tmp240552593.exe 94 PID 3340 wrote to memory of 4368 3340 tmp240552593.exe 94 PID 3340 wrote to memory of 4368 3340 tmp240552593.exe 94 PID 4368 wrote to memory of 1640 4368 notpad.exe 95 PID 4368 wrote to memory of 1640 4368 notpad.exe 95 PID 4368 wrote to memory of 1640 4368 notpad.exe 95 PID 4368 wrote to memory of 1916 4368 notpad.exe 96 PID 4368 wrote to memory of 1916 4368 notpad.exe 96 PID 4368 wrote to memory of 1916 4368 notpad.exe 96 PID 1640 wrote to memory of 1576 1640 tmp240553906.exe 97 PID 1640 wrote to memory of 1576 1640 tmp240553906.exe 97 PID 1640 wrote to memory of 1576 1640 tmp240553906.exe 97 PID 1576 wrote to memory of 1912 1576 notpad.exe 98 PID 1576 wrote to memory of 1912 1576 notpad.exe 98 PID 1576 wrote to memory of 1912 1576 notpad.exe 98 PID 1576 wrote to memory of 952 1576 notpad.exe 99 PID 1576 wrote to memory of 952 1576 notpad.exe 99 PID 1576 wrote to memory of 952 1576 notpad.exe 99 PID 1912 wrote to memory of 1704 1912 tmp240554140.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe"C:\Users\Admin\AppData\Local\Temp\c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\tmp240550468.exeC:\Users\Admin\AppData\Local\Temp\tmp240550468.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\tmp240552062.exeC:\Users\Admin\AppData\Local\Temp\tmp240552062.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\tmp240552328.exeC:\Users\Admin\AppData\Local\Temp\tmp240552328.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\tmp240552593.exeC:\Users\Admin\AppData\Local\Temp\tmp240552593.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\tmp240553906.exeC:\Users\Admin\AppData\Local\Temp\tmp240553906.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\tmp240554140.exeC:\Users\Admin\AppData\Local\Temp\tmp240554140.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\tmp240554421.exeC:\Users\Admin\AppData\Local\Temp\tmp240554421.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:3212 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\tmp240554703.exeC:\Users\Admin\AppData\Local\Temp\tmp240554703.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:3240
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240554718.exeC:\Users\Admin\AppData\Local\Temp\tmp240554718.exe16⤵
- Executes dropped EXE
PID:4292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240554468.exeC:\Users\Admin\AppData\Local\Temp\tmp240554468.exe14⤵
- Executes dropped EXE
PID:4984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240554156.exeC:\Users\Admin\AppData\Local\Temp\tmp240554156.exe12⤵
- Executes dropped EXE
PID:952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240553921.exeC:\Users\Admin\AppData\Local\Temp\tmp240553921.exe10⤵
- Executes dropped EXE
PID:1916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240553703.exeC:\Users\Admin\AppData\Local\Temp\tmp240553703.exe8⤵
- Executes dropped EXE
PID:4716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240552375.exeC:\Users\Admin\AppData\Local\Temp\tmp240552375.exe6⤵
- Executes dropped EXE
PID:5088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240552109.exeC:\Users\Admin\AppData\Local\Temp\tmp240552109.exe4⤵
- Executes dropped EXE
PID:1152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240550500.exeC:\Users\Admin\AppData\Local\Temp\tmp240550500.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\tmp240550593.exeC:\Users\Admin\AppData\Local\Temp\tmp240550593.exe3⤵
- Executes dropped EXE
PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240550625.exeC:\Users\Admin\AppData\Local\Temp\tmp240550625.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\tmp240550890.exeC:\Users\Admin\AppData\Local\Temp\tmp240550890.exe4⤵
- Executes dropped EXE
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240551281.exeC:\Users\Admin\AppData\Local\Temp\tmp240551281.exe4⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 2245⤵
- Program crash
PID:4704
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3280 -ip 32801⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\tmp240554875.exeC:\Users\Admin\AppData\Local\Temp\tmp240554875.exe1⤵
- Executes dropped EXE
PID:3716
-
C:\Users\Admin\AppData\Local\Temp\tmp240555000.exeC:\Users\Admin\AppData\Local\Temp\tmp240555000.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3856 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\tmp240555203.exeC:\Users\Admin\AppData\Local\Temp\tmp240555203.exe3⤵
- Executes dropped EXE
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240555187.exeC:\Users\Admin\AppData\Local\Temp\tmp240555187.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\tmp240555343.exeC:\Users\Admin\AppData\Local\Temp\tmp240555343.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1724 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\tmp240555515.exeC:\Users\Admin\AppData\Local\Temp\tmp240555515.exe7⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\tmp240555671.exeC:\Users\Admin\AppData\Local\Temp\tmp240555671.exe9⤵
- Executes dropped EXE
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240555656.exeC:\Users\Admin\AppData\Local\Temp\tmp240555656.exe9⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240555531.exeC:\Users\Admin\AppData\Local\Temp\tmp240555531.exe7⤵
- Executes dropped EXE
PID:3568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240555375.exeC:\Users\Admin\AppData\Local\Temp\tmp240555375.exe5⤵
- Executes dropped EXE
PID:1688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240555031.exeC:\Users\Admin\AppData\Local\Temp\tmp240555031.exe1⤵
- Executes dropped EXE
PID:2916
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"1⤵
- Executes dropped EXE
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\tmp240554859.exeC:\Users\Admin\AppData\Local\Temp\tmp240554859.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:3672
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"1⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\tmp240555796.exeC:\Users\Admin\AppData\Local\Temp\tmp240555796.exe2⤵
- Executes dropped EXE
- Checks computer location settings
PID:1992 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\tmp240555937.exeC:\Users\Admin\AppData\Local\Temp\tmp240555937.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4052 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\tmp240556125.exeC:\Users\Admin\AppData\Local\Temp\tmp240556125.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3888 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\tmp240556421.exeC:\Users\Admin\AppData\Local\Temp\tmp240556421.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2856 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\tmp240556750.exeC:\Users\Admin\AppData\Local\Temp\tmp240556750.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\tmp240557031.exeC:\Users\Admin\AppData\Local\Temp\tmp240557031.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1192 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\tmp240557484.exeC:\Users\Admin\AppData\Local\Temp\tmp240557484.exe14⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\tmp240557703.exeC:\Users\Admin\AppData\Local\Temp\tmp240557703.exe16⤵
- Checks computer location settings
- Modifies registry class
PID:3900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\tmp240557953.exeC:\Users\Admin\AppData\Local\Temp\tmp240557953.exe18⤵
- Checks computer location settings
- Modifies registry class
PID:1216 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\tmp240558140.exeC:\Users\Admin\AppData\Local\Temp\tmp240558140.exe20⤵
- Drops file in System32 directory
- Modifies registry class
PID:2516 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\tmp240558265.exeC:\Users\Admin\AppData\Local\Temp\tmp240558265.exe22⤵
- Modifies registry class
PID:4320 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\tmp240558500.exeC:\Users\Admin\AppData\Local\Temp\tmp240558500.exe24⤵
- Modifies registry class
PID:3172 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\tmp240558859.exeC:\Users\Admin\AppData\Local\Temp\tmp240558859.exe26⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\tmp240559093.exeC:\Users\Admin\AppData\Local\Temp\tmp240559093.exe28⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4664 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\tmp240559562.exeC:\Users\Admin\AppData\Local\Temp\tmp240559562.exe30⤵
- Checks computer location settings
- Modifies registry class
PID:4196 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\tmp240559781.exeC:\Users\Admin\AppData\Local\Temp\tmp240559781.exe32⤵
- Checks computer location settings
PID:4128 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\tmp240560000.exeC:\Users\Admin\AppData\Local\Temp\tmp240560000.exe34⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5068 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\tmp240560250.exeC:\Users\Admin\AppData\Local\Temp\tmp240560250.exe36⤵
- Drops file in System32 directory
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\tmp240560468.exeC:\Users\Admin\AppData\Local\Temp\tmp240560468.exe38⤵
- Modifies registry class
PID:4108 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\tmp240560687.exeC:\Users\Admin\AppData\Local\Temp\tmp240560687.exe40⤵
- Modifies registry class
PID:1048 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\tmp240560890.exeC:\Users\Admin\AppData\Local\Temp\tmp240560890.exe42⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\tmp240561062.exeC:\Users\Admin\AppData\Local\Temp\tmp240561062.exe44⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3672 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\tmp240561265.exeC:\Users\Admin\AppData\Local\Temp\tmp240561265.exe46⤵
- Drops file in System32 directory
- Modifies registry class
PID:3188 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\tmp240561453.exeC:\Users\Admin\AppData\Local\Temp\tmp240561453.exe48⤵PID:4448
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\tmp240561843.exeC:\Users\Admin\AppData\Local\Temp\tmp240561843.exe50⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\tmp240562015.exeC:\Users\Admin\AppData\Local\Temp\tmp240562015.exe52⤵
- Checks computer location settings
- Modifies registry class
PID:3544 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\tmp240562203.exeC:\Users\Admin\AppData\Local\Temp\tmp240562203.exe54⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:832 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\tmp240562359.exeC:\Users\Admin\AppData\Local\Temp\tmp240562359.exe56⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\tmp240562562.exeC:\Users\Admin\AppData\Local\Temp\tmp240562562.exe58⤵
- Checks computer location settings
- Modifies registry class
PID:4440 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\tmp240562765.exeC:\Users\Admin\AppData\Local\Temp\tmp240562765.exe60⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1432 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\tmp240562890.exeC:\Users\Admin\AppData\Local\Temp\tmp240562890.exe62⤵
- Checks computer location settings
PID:4336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\tmp240563109.exeC:\Users\Admin\AppData\Local\Temp\tmp240563109.exe64⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\tmp240563359.exeC:\Users\Admin\AppData\Local\Temp\tmp240563359.exe66⤵
- Checks computer location settings
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\tmp240563625.exeC:\Users\Admin\AppData\Local\Temp\tmp240563625.exe68⤵
- Drops file in System32 directory
PID:3740 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\tmp240563812.exeC:\Users\Admin\AppData\Local\Temp\tmp240563812.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4412 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\tmp240592843.exeC:\Users\Admin\AppData\Local\Temp\tmp240592843.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\tmp240593031.exeC:\Users\Admin\AppData\Local\Temp\tmp240593031.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2128 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\tmp240593281.exeC:\Users\Admin\AppData\Local\Temp\tmp240593281.exe76⤵
- Drops file in System32 directory
PID:4692 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\tmp240593484.exeC:\Users\Admin\AppData\Local\Temp\tmp240593484.exe78⤵
- Checks computer location settings
- Modifies registry class
PID:3340 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\tmp240593671.exeC:\Users\Admin\AppData\Local\Temp\tmp240593671.exe80⤵
- Checks computer location settings
- Modifies registry class
PID:4100 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\tmp240593859.exeC:\Users\Admin\AppData\Local\Temp\tmp240593859.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\tmp240594046.exeC:\Users\Admin\AppData\Local\Temp\tmp240594046.exe84⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4144 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\tmp240594250.exeC:\Users\Admin\AppData\Local\Temp\tmp240594250.exe86⤵
- Checks computer location settings
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\tmp240594468.exeC:\Users\Admin\AppData\Local\Temp\tmp240594468.exe88⤵
- Checks computer location settings
PID:2904 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\tmp240594671.exeC:\Users\Admin\AppData\Local\Temp\tmp240594671.exe90⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3732 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\tmp240594859.exeC:\Users\Admin\AppData\Local\Temp\tmp240594859.exe92⤵
- Checks computer location settings
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\tmp240595046.exeC:\Users\Admin\AppData\Local\Temp\tmp240595046.exe94⤵
- Modifies registry class
PID:5028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\tmp240595265.exeC:\Users\Admin\AppData\Local\Temp\tmp240595265.exe96⤵
- Checks computer location settings
PID:3124 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\tmp240595500.exeC:\Users\Admin\AppData\Local\Temp\tmp240595500.exe98⤵
- Drops file in System32 directory
- Modifies registry class
PID:1876 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\tmp240595781.exeC:\Users\Admin\AppData\Local\Temp\tmp240595781.exe100⤵
- Checks computer location settings
- Modifies registry class
PID:4512 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\tmp240596031.exeC:\Users\Admin\AppData\Local\Temp\tmp240596031.exe102⤵
- Modifies registry class
PID:4792 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\tmp240596312.exeC:\Users\Admin\AppData\Local\Temp\tmp240596312.exe104⤵
- Checks computer location settings
PID:1092 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\tmp240596484.exeC:\Users\Admin\AppData\Local\Temp\tmp240596484.exe106⤵
- Checks computer location settings
- Modifies registry class
PID:1468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\tmp240596687.exeC:\Users\Admin\AppData\Local\Temp\tmp240596687.exe108⤵
- Checks computer location settings
PID:4980 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\tmp240596968.exeC:\Users\Admin\AppData\Local\Temp\tmp240596968.exe110⤵
- Modifies registry class
PID:4572 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\tmp240597312.exeC:\Users\Admin\AppData\Local\Temp\tmp240597312.exe112⤵
- Drops file in System32 directory
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\tmp240597515.exeC:\Users\Admin\AppData\Local\Temp\tmp240597515.exe114⤵
- Modifies registry class
PID:3916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\tmp240597718.exeC:\Users\Admin\AppData\Local\Temp\tmp240597718.exe116⤵
- Modifies registry class
PID:1160 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\tmp240597906.exeC:\Users\Admin\AppData\Local\Temp\tmp240597906.exe118⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4772 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\tmp240598140.exeC:\Users\Admin\AppData\Local\Temp\tmp240598140.exe120⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3180 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\tmp240598484.exeC:\Users\Admin\AppData\Local\Temp\tmp240598484.exe122⤵
- Drops file in System32 directory
PID:4688
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-