Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
109s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe
Resource
win10v2004-20220901-en
General
-
Target
f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe
-
Size
1.2MB
-
MD5
32773553d7da8e443020d96b44ce976b
-
SHA1
8b9ea5dc13c096984d9b83c226b55dce38496e7c
-
SHA256
f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5
-
SHA512
e4fcd56010b520dd2db2a2a0911fedb024e37c76277b87373248208f14a18a3f76ff0411f6586bf5b24576840ea4d5f37910baf2a919631b9a78a09e86d41a93
-
SSDEEP
12288:bdPePldPZdPnsH5utjoPhdPZdPXPldPZdPePldPZdPnsH5utj8PhdPZdPXPldPZK:csH5utjFsH5utjJsH5utj
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 452 notpad.exe 3076 tmp240587281.exe 4508 tmp240587375.exe 1904 notpad.exe 4568 tmp240587765.exe 4988 tmp240587890.exe 340 notpad.exe 4400 tmp240588312.exe 3412 tmp240588406.exe 3264 notpad.exe 3692 tmp240588859.exe 3968 tmp240588937.exe 2524 notpad.exe 1580 tmp240589328.exe 1236 tmp240589421.exe 3548 notpad.exe 3336 tmp240589781.exe 3500 tmp240589921.exe 372 notpad.exe 3112 tmp240590328.exe 3120 tmp240590375.exe 4492 notpad.exe 2256 tmp240590718.exe 2492 tmp240593078.exe 4432 notpad.exe 4308 tmp240593421.exe 3260 tmp240593484.exe 1148 notpad.exe 4348 tmp240593921.exe 1104 tmp240594015.exe 1956 notpad.exe 2004 tmp240594468.exe 4588 tmp240594531.exe 4916 notpad.exe 2868 tmp240595000.exe 2788 tmp240595046.exe 1908 notpad.exe 4016 tmp240595296.exe 2688 tmp240595343.exe 2348 notpad.exe 3680 tmp240595578.exe 3492 tmp240595640.exe 1092 notpad.exe 3508 tmp240595968.exe 4356 tmp240596000.exe 4092 notpad.exe 4064 tmp240596218.exe 3684 tmp240596265.exe 3412 notpad.exe 1648 tmp240596500.exe 4400 tmp240596531.exe 2380 notpad.exe 3968 tmp240596859.exe 4808 tmp240596937.exe 3232 notpad.exe 812 tmp240597234.exe 4576 tmp240597281.exe 4296 notpad.exe 3664 tmp240597500.exe 3860 tmp240597546.exe 4604 notpad.exe 1400 tmp240597796.exe 3336 tmp240597906.exe 2860 notpad.exe -
resource yara_rule behavioral2/files/0x0005000000022e00-133.dat upx behavioral2/files/0x0005000000022e00-134.dat upx behavioral2/memory/452-138-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/452-143-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-139.dat upx behavioral2/files/0x0005000000022e00-145.dat upx behavioral2/memory/1904-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-149.dat upx behavioral2/files/0x0005000000022e00-155.dat upx behavioral2/memory/340-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/340-164-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-159.dat upx behavioral2/files/0x0005000000022e00-166.dat upx behavioral2/files/0x0003000000022def-171.dat upx behavioral2/memory/3264-174-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0005000000022e00-176.dat upx behavioral2/memory/2524-184-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-181.dat upx behavioral2/files/0x0005000000022e00-186.dat upx behavioral2/memory/3548-194-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-191.dat upx behavioral2/files/0x0005000000022e00-196.dat upx behavioral2/memory/372-204-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-201.dat upx behavioral2/files/0x0005000000022e00-206.dat upx behavioral2/memory/4492-207-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4492-215-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-212.dat upx behavioral2/files/0x0005000000022e00-217.dat upx behavioral2/memory/4432-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-221.dat upx behavioral2/files/0x0005000000022e00-227.dat upx behavioral2/memory/1148-235-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0003000000022def-232.dat upx behavioral2/files/0x0005000000022e00-237.dat upx behavioral2/memory/1956-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4916-246-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1908-250-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2348-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1092-258-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4092-262-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3412-266-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2380-268-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2380-271-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3232-275-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4296-279-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4604-282-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4604-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2860-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2700-287-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1168-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4312-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3948-290-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1148-291-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4544-292-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3868-293-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3868-294-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1908-295-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1536-296-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1380-297-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/840-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/840-299-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2188-300-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3968-301-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240657468.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240655593.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240609609.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240621453.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240601125.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240611984.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240617890.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240593921.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240595296.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240595578.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240610890.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240611218.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240618703.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240622578.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240640375.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240653234.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587765.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240605640.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240599687.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240610187.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240612359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240614359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240652500.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240656421.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240595000.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240596218.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240588312.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240610484.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240612531.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240631015.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240638281.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240595968.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240599328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240609203.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240628015.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240628406.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240642359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240607531.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240627406.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240644093.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240672500.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240601390.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240611640.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240671640.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240598140.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240619281.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240590328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240599015.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240603328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240612953.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240613703.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240618234.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240587281.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240589328.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240627687.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240631562.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240639187.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240644625.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240654921.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240622093.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240626359.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation tmp240641890.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240671640.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240619281.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240605203.exe File created C:\Windows\SysWOW64\notpad.exe tmp240618234.exe File created C:\Windows\SysWOW64\notpad.exe tmp240629093.exe File created C:\Windows\SysWOW64\notpad.exe tmp240595968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240595578.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240603609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240603906.exe File created C:\Windows\SysWOW64\notpad.exe tmp240607531.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240657343.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File created C:\Windows\SysWOW64\notpad.exe tmp240587765.exe File created C:\Windows\SysWOW64\notpad.exe tmp240600562.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240606000.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240607062.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240617890.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240631453.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240653234.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240595000.exe File created C:\Windows\SysWOW64\notpad.exe tmp240593921.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600828.exe File created C:\Windows\SysWOW64\notpad.exe tmp240614218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240622953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240628406.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240641468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240589781.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240589328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240590718.exe File created C:\Windows\SysWOW64\notpad.exe tmp240600328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240642750.exe File created C:\Windows\SysWOW64\fsb.tmp f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240596859.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240599328.exe File created C:\Windows\SysWOW64\notpad.exe tmp240602687.exe File created C:\Windows\SysWOW64\notpad.exe tmp240603062.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240608593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240614359.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240629906.exe File created C:\Windows\SysWOW64\notpad.exe tmp240589328.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240626875.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240638281.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240640984.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240610484.exe File created C:\Windows\SysWOW64\notpad.exe tmp240603328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240609875.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240598140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240596218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240596500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240620796.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240631015.exe File created C:\Windows\SysWOW64\notpad.exe tmp240639187.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240643531.exe File created C:\Windows\SysWOW64\notpad.exe tmp240595578.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240603328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240611640.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240620078.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240621062.exe File created C:\Windows\SysWOW64\notpad.exe tmp240641468.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240596859.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240601984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240601984.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240654171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240618234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240621765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240672500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240597796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240607062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240610484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240589328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240611984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240619281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240638734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240653234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240656421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603609.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240641890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240601125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240609875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240593421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240588859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240599328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240599015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639562.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 452 4396 f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe 83 PID 4396 wrote to memory of 452 4396 f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe 83 PID 4396 wrote to memory of 452 4396 f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe 83 PID 452 wrote to memory of 3076 452 notpad.exe 84 PID 452 wrote to memory of 3076 452 notpad.exe 84 PID 452 wrote to memory of 3076 452 notpad.exe 84 PID 452 wrote to memory of 4508 452 notpad.exe 85 PID 452 wrote to memory of 4508 452 notpad.exe 85 PID 452 wrote to memory of 4508 452 notpad.exe 85 PID 3076 wrote to memory of 1904 3076 tmp240587281.exe 86 PID 3076 wrote to memory of 1904 3076 tmp240587281.exe 86 PID 3076 wrote to memory of 1904 3076 tmp240587281.exe 86 PID 1904 wrote to memory of 4568 1904 notpad.exe 87 PID 1904 wrote to memory of 4568 1904 notpad.exe 87 PID 1904 wrote to memory of 4568 1904 notpad.exe 87 PID 1904 wrote to memory of 4988 1904 notpad.exe 89 PID 1904 wrote to memory of 4988 1904 notpad.exe 89 PID 1904 wrote to memory of 4988 1904 notpad.exe 89 PID 4568 wrote to memory of 340 4568 tmp240587765.exe 88 PID 4568 wrote to memory of 340 4568 tmp240587765.exe 88 PID 4568 wrote to memory of 340 4568 tmp240587765.exe 88 PID 340 wrote to memory of 4400 340 notpad.exe 90 PID 340 wrote to memory of 4400 340 notpad.exe 90 PID 340 wrote to memory of 4400 340 notpad.exe 90 PID 340 wrote to memory of 3412 340 notpad.exe 91 PID 340 wrote to memory of 3412 340 notpad.exe 91 PID 340 wrote to memory of 3412 340 notpad.exe 91 PID 4400 wrote to memory of 3264 4400 tmp240588312.exe 92 PID 4400 wrote to memory of 3264 4400 tmp240588312.exe 92 PID 4400 wrote to memory of 3264 4400 tmp240588312.exe 92 PID 3264 wrote to memory of 3692 3264 notpad.exe 93 PID 3264 wrote to memory of 3692 3264 notpad.exe 93 PID 3264 wrote to memory of 3692 3264 notpad.exe 93 PID 3264 wrote to memory of 3968 3264 notpad.exe 94 PID 3264 wrote to memory of 3968 3264 notpad.exe 94 PID 3264 wrote to memory of 3968 3264 notpad.exe 94 PID 3692 wrote to memory of 2524 3692 tmp240588859.exe 95 PID 3692 wrote to memory of 2524 3692 tmp240588859.exe 95 PID 3692 wrote to memory of 2524 3692 tmp240588859.exe 95 PID 2524 wrote to memory of 1580 2524 notpad.exe 96 PID 2524 wrote to memory of 1580 2524 notpad.exe 96 PID 2524 wrote to memory of 1580 2524 notpad.exe 96 PID 2524 wrote to memory of 1236 2524 notpad.exe 97 PID 2524 wrote to memory of 1236 2524 notpad.exe 97 PID 2524 wrote to memory of 1236 2524 notpad.exe 97 PID 1580 wrote to memory of 3548 1580 tmp240589328.exe 98 PID 1580 wrote to memory of 3548 1580 tmp240589328.exe 98 PID 1580 wrote to memory of 3548 1580 tmp240589328.exe 98 PID 3548 wrote to memory of 3336 3548 notpad.exe 99 PID 3548 wrote to memory of 3336 3548 notpad.exe 99 PID 3548 wrote to memory of 3336 3548 notpad.exe 99 PID 3548 wrote to memory of 3500 3548 notpad.exe 100 PID 3548 wrote to memory of 3500 3548 notpad.exe 100 PID 3548 wrote to memory of 3500 3548 notpad.exe 100 PID 3336 wrote to memory of 372 3336 tmp240589781.exe 101 PID 3336 wrote to memory of 372 3336 tmp240589781.exe 101 PID 3336 wrote to memory of 372 3336 tmp240589781.exe 101 PID 372 wrote to memory of 3112 372 notpad.exe 102 PID 372 wrote to memory of 3112 372 notpad.exe 102 PID 372 wrote to memory of 3112 372 notpad.exe 102 PID 372 wrote to memory of 3120 372 notpad.exe 104 PID 372 wrote to memory of 3120 372 notpad.exe 104 PID 372 wrote to memory of 3120 372 notpad.exe 104 PID 3112 wrote to memory of 4492 3112 tmp240590328.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe"C:\Users\Admin\AppData\Local\Temp\f982412f8fcd2abc4359fd1ab5aebfe5d170665bffd660b8c64dc7357cda44f5.exe"1⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\tmp240587281.exeC:\Users\Admin\AppData\Local\Temp\tmp240587281.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\tmp240587765.exeC:\Users\Admin\AppData\Local\Temp\tmp240587765.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\tmp240588312.exeC:\Users\Admin\AppData\Local\Temp\tmp240588312.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\tmp240588859.exeC:\Users\Admin\AppData\Local\Temp\tmp240588859.exe9⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\tmp240589328.exeC:\Users\Admin\AppData\Local\Temp\tmp240589328.exe11⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\tmp240589781.exeC:\Users\Admin\AppData\Local\Temp\tmp240589781.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\tmp240590328.exeC:\Users\Admin\AppData\Local\Temp\tmp240590328.exe15⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\tmp240590718.exeC:\Users\Admin\AppData\Local\Temp\tmp240590718.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\tmp240593421.exeC:\Users\Admin\AppData\Local\Temp\tmp240593421.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:4308 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\tmp240593921.exeC:\Users\Admin\AppData\Local\Temp\tmp240593921.exe21⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\tmp240594468.exeC:\Users\Admin\AppData\Local\Temp\tmp240594468.exe23⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\tmp240595000.exeC:\Users\Admin\AppData\Local\Temp\tmp240595000.exe25⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\tmp240595296.exeC:\Users\Admin\AppData\Local\Temp\tmp240595296.exe27⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4016 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\tmp240595578.exeC:\Users\Admin\AppData\Local\Temp\tmp240595578.exe29⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3680 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\tmp240595968.exeC:\Users\Admin\AppData\Local\Temp\tmp240595968.exe31⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
PID:3508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\tmp240596218.exeC:\Users\Admin\AppData\Local\Temp\tmp240596218.exe33⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4064 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵
- Executes dropped EXE
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\tmp240596500.exeC:\Users\Admin\AppData\Local\Temp\tmp240596500.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\tmp240596859.exeC:\Users\Admin\AppData\Local\Temp\tmp240596859.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵
- Executes dropped EXE
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\tmp240597234.exeC:\Users\Admin\AppData\Local\Temp\tmp240597234.exe39⤵
- Executes dropped EXE
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"40⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\tmp240597500.exeC:\Users\Admin\AppData\Local\Temp\tmp240597500.exe41⤵
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵
- Executes dropped EXE
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\tmp240597796.exeC:\Users\Admin\AppData\Local\Temp\tmp240597796.exe43⤵
- Executes dropped EXE
- Modifies registry class
PID:1400 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵
- Executes dropped EXE
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\tmp240598140.exeC:\Users\Admin\AppData\Local\Temp\tmp240598140.exe45⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\tmp240599015.exeC:\Users\Admin\AppData\Local\Temp\tmp240599015.exe47⤵
- Checks computer location settings
- Modifies registry class
PID:844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"48⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\tmp240599328.exeC:\Users\Admin\AppData\Local\Temp\tmp240599328.exe49⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"50⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\tmp240599687.exeC:\Users\Admin\AppData\Local\Temp\tmp240599687.exe51⤵
- Checks computer location settings
PID:548 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\tmp240600031.exeC:\Users\Admin\AppData\Local\Temp\tmp240600031.exe53⤵
- Modifies registry class
PID:3520 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\tmp240600328.exeC:\Users\Admin\AppData\Local\Temp\tmp240600328.exe55⤵
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\tmp240600562.exeC:\Users\Admin\AppData\Local\Temp\tmp240600562.exe57⤵
- Drops file in System32 directory
- Modifies registry class
PID:2268 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\tmp240600828.exeC:\Users\Admin\AppData\Local\Temp\tmp240600828.exe59⤵
- Drops file in System32 directory
PID:4648 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"60⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\tmp240601125.exeC:\Users\Admin\AppData\Local\Temp\tmp240601125.exe61⤵
- Checks computer location settings
- Modifies registry class
PID:3876 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\tmp240601390.exeC:\Users\Admin\AppData\Local\Temp\tmp240601390.exe63⤵
- Checks computer location settings
- Modifies registry class
PID:2952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\tmp240601687.exeC:\Users\Admin\AppData\Local\Temp\tmp240601687.exe65⤵
- Modifies registry class
PID:5076 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\tmp240601984.exeC:\Users\Admin\AppData\Local\Temp\tmp240601984.exe67⤵
- Drops file in System32 directory
PID:3412 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\tmp240602250.exeC:\Users\Admin\AppData\Local\Temp\tmp240602250.exe69⤵
- Modifies registry class
PID:4392 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\tmp240602453.exeC:\Users\Admin\AppData\Local\Temp\tmp240602453.exe71⤵
- Modifies registry class
PID:4640 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\tmp240602687.exeC:\Users\Admin\AppData\Local\Temp\tmp240602687.exe73⤵
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\tmp240603062.exeC:\Users\Admin\AppData\Local\Temp\tmp240603062.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:5088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\tmp240603328.exeC:\Users\Admin\AppData\Local\Temp\tmp240603328.exe77⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4332 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\tmp240603609.exeC:\Users\Admin\AppData\Local\Temp\tmp240603609.exe79⤵
- Drops file in System32 directory
- Modifies registry class
PID:364 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\tmp240603906.exeC:\Users\Admin\AppData\Local\Temp\tmp240603906.exe81⤵
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\tmp240605203.exeC:\Users\Admin\AppData\Local\Temp\tmp240605203.exe83⤵
- Drops file in System32 directory
PID:4368 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\tmp240605796.exeC:\Users\Admin\AppData\Local\Temp\tmp240605796.exe85⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240605843.exeC:\Users\Admin\AppData\Local\Temp\tmp240605843.exe85⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\tmp240606000.exeC:\Users\Admin\AppData\Local\Temp\tmp240606000.exe86⤵
- Drops file in System32 directory
- Modifies registry class
PID:5032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\tmp240606375.exeC:\Users\Admin\AppData\Local\Temp\tmp240606375.exe88⤵
- Modifies registry class
PID:2688 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\tmp240607109.exeC:\Users\Admin\AppData\Local\Temp\tmp240607109.exe90⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240607281.exeC:\Users\Admin\AppData\Local\Temp\tmp240607281.exe90⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\tmp240607750.exeC:\Users\Admin\AppData\Local\Temp\tmp240607750.exe91⤵PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240607921.exeC:\Users\Admin\AppData\Local\Temp\tmp240607921.exe91⤵PID:2692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240606796.exeC:\Users\Admin\AppData\Local\Temp\tmp240606796.exe88⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\tmp240607062.exeC:\Users\Admin\AppData\Local\Temp\tmp240607062.exe89⤵
- Drops file in System32 directory
- Modifies registry class
PID:3076 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\tmp240607531.exeC:\Users\Admin\AppData\Local\Temp\tmp240607531.exe91⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"92⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\tmp240608171.exeC:\Users\Admin\AppData\Local\Temp\tmp240608171.exe93⤵PID:4184
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"94⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\tmp240608593.exeC:\Users\Admin\AppData\Local\Temp\tmp240608593.exe95⤵
- Drops file in System32 directory
PID:1472 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\tmp240609250.exeC:\Users\Admin\AppData\Local\Temp\tmp240609250.exe97⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240609390.exeC:\Users\Admin\AppData\Local\Temp\tmp240609390.exe97⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\tmp240609687.exeC:\Users\Admin\AppData\Local\Temp\tmp240609687.exe98⤵PID:4332
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240609828.exeC:\Users\Admin\AppData\Local\Temp\tmp240609828.exe98⤵PID:4952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240608937.exeC:\Users\Admin\AppData\Local\Temp\tmp240608937.exe95⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\tmp240609203.exeC:\Users\Admin\AppData\Local\Temp\tmp240609203.exe96⤵
- Checks computer location settings
PID:1532 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\tmp240609609.exeC:\Users\Admin\AppData\Local\Temp\tmp240609609.exe98⤵
- Checks computer location settings
PID:4120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\tmp240609968.exeC:\Users\Admin\AppData\Local\Temp\tmp240609968.exe100⤵PID:364
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240610046.exeC:\Users\Admin\AppData\Local\Temp\tmp240610046.exe100⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\tmp240610078.exeC:\Users\Admin\AppData\Local\Temp\tmp240610078.exe101⤵PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240610109.exeC:\Users\Admin\AppData\Local\Temp\tmp240610109.exe101⤵PID:4248
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240609703.exeC:\Users\Admin\AppData\Local\Temp\tmp240609703.exe98⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\tmp240609875.exeC:\Users\Admin\AppData\Local\Temp\tmp240609875.exe99⤵
- Drops file in System32 directory
- Modifies registry class
PID:4948 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\tmp240610187.exeC:\Users\Admin\AppData\Local\Temp\tmp240610187.exe101⤵
- Checks computer location settings
PID:3172 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\tmp240610484.exeC:\Users\Admin\AppData\Local\Temp\tmp240610484.exe103⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1644 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\tmp240610890.exeC:\Users\Admin\AppData\Local\Temp\tmp240610890.exe105⤵
- Checks computer location settings
PID:3140 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"106⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\tmp240611218.exeC:\Users\Admin\AppData\Local\Temp\tmp240611218.exe107⤵
- Checks computer location settings
PID:3552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\tmp240611562.exeC:\Users\Admin\AppData\Local\Temp\tmp240611562.exe109⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240611593.exeC:\Users\Admin\AppData\Local\Temp\tmp240611593.exe109⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\tmp240611640.exeC:\Users\Admin\AppData\Local\Temp\tmp240611640.exe110⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4836 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\tmp240611984.exeC:\Users\Admin\AppData\Local\Temp\tmp240611984.exe112⤵
- Checks computer location settings
- Modifies registry class
PID:3380 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\tmp240612359.exeC:\Users\Admin\AppData\Local\Temp\tmp240612359.exe114⤵
- Checks computer location settings
- Modifies registry class
PID:3160 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\tmp240612640.exeC:\Users\Admin\AppData\Local\Temp\tmp240612640.exe116⤵PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240612734.exeC:\Users\Admin\AppData\Local\Temp\tmp240612734.exe116⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\tmp240612828.exeC:\Users\Admin\AppData\Local\Temp\tmp240612828.exe117⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240612890.exeC:\Users\Admin\AppData\Local\Temp\tmp240612890.exe117⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\tmp240613078.exeC:\Users\Admin\AppData\Local\Temp\tmp240613078.exe118⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240613187.exeC:\Users\Admin\AppData\Local\Temp\tmp240613187.exe118⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\tmp240613234.exeC:\Users\Admin\AppData\Local\Temp\tmp240613234.exe119⤵PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240613312.exeC:\Users\Admin\AppData\Local\Temp\tmp240613312.exe119⤵PID:2112
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp240612375.exeC:\Users\Admin\AppData\Local\Temp\tmp240612375.exe114⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\tmp240612531.exeC:\Users\Admin\AppData\Local\Temp\tmp240612531.exe115⤵
- Checks computer location settings
- Modifies registry class
PID:4708 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\tmp240612953.exeC:\Users\Admin\AppData\Local\Temp\tmp240612953.exe117⤵
- Checks computer location settings
- Modifies registry class
PID:4028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\tmp240613359.exeC:\Users\Admin\AppData\Local\Temp\tmp240613359.exe119⤵PID:4244
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"120⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\tmp240613703.exeC:\Users\Admin\AppData\Local\Temp\tmp240613703.exe121⤵
- Checks computer location settings
PID:4280 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"122⤵PID:4544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-