Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2023, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
Amazon.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Amazon.exe
Resource
win10v2004-20230220-en
General
-
Target
Amazon.exe
-
Size
41KB
-
MD5
60ec6e4ca8a1cd04af323bf7a88e035a
-
SHA1
97f88faf8bfdeedf862b7d6708f0e2b316958c51
-
SHA256
6fd01d480e1599656fd9760ef5267ed8c4e39a44d5b2a34e82551c68870099e8
-
SHA512
c18e3120666fe11082b50bb57f04090ac179da58b02e7ee6a7349a8fdafd7afcfeff2ac6b1c7ecdb7a21613a8534c5cac50daeac890ccb79daf24c3498ef892b
-
SSDEEP
384:3LxmvPawQr/udaLidhPLTuRfm1sICJbt5j8KoQrJKVTUjaOdhQQu0TLwaOHEr6Ia:7xy4NOIRuRVGLdCQu0TkJ6a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Amazon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 748 1696 Amazon.exe 83 PID 1696 wrote to memory of 748 1696 Amazon.exe 83 PID 748 wrote to memory of 1976 748 cmd.exe 85 PID 748 wrote to memory of 1976 748 cmd.exe 85 PID 748 wrote to memory of 628 748 cmd.exe 86 PID 748 wrote to memory of 628 748 cmd.exe 86 PID 748 wrote to memory of 2240 748 cmd.exe 87 PID 748 wrote to memory of 2240 748 cmd.exe 87 PID 748 wrote to memory of 2980 748 cmd.exe 124 PID 748 wrote to memory of 2980 748 cmd.exe 124 PID 748 wrote to memory of 3632 748 cmd.exe 123 PID 748 wrote to memory of 3632 748 cmd.exe 123 PID 748 wrote to memory of 1412 748 cmd.exe 122 PID 748 wrote to memory of 1412 748 cmd.exe 122 PID 748 wrote to memory of 3620 748 cmd.exe 121 PID 748 wrote to memory of 3620 748 cmd.exe 121 PID 748 wrote to memory of 724 748 cmd.exe 88 PID 748 wrote to memory of 724 748 cmd.exe 88 PID 748 wrote to memory of 4136 748 cmd.exe 120 PID 748 wrote to memory of 4136 748 cmd.exe 120 PID 748 wrote to memory of 3920 748 cmd.exe 119 PID 748 wrote to memory of 3920 748 cmd.exe 119 PID 748 wrote to memory of 2692 748 cmd.exe 118 PID 748 wrote to memory of 2692 748 cmd.exe 118 PID 748 wrote to memory of 4480 748 cmd.exe 117 PID 748 wrote to memory of 4480 748 cmd.exe 117 PID 748 wrote to memory of 2852 748 cmd.exe 116 PID 748 wrote to memory of 2852 748 cmd.exe 116 PID 748 wrote to memory of 508 748 cmd.exe 115 PID 748 wrote to memory of 508 748 cmd.exe 115 PID 748 wrote to memory of 4960 748 cmd.exe 114 PID 748 wrote to memory of 4960 748 cmd.exe 114 PID 748 wrote to memory of 3328 748 cmd.exe 113 PID 748 wrote to memory of 3328 748 cmd.exe 113 PID 748 wrote to memory of 1320 748 cmd.exe 89 PID 748 wrote to memory of 1320 748 cmd.exe 89 PID 748 wrote to memory of 1668 748 cmd.exe 103 PID 748 wrote to memory of 1668 748 cmd.exe 103 PID 748 wrote to memory of 4188 748 cmd.exe 102 PID 748 wrote to memory of 4188 748 cmd.exe 102 PID 748 wrote to memory of 232 748 cmd.exe 101 PID 748 wrote to memory of 232 748 cmd.exe 101 PID 748 wrote to memory of 4180 748 cmd.exe 100 PID 748 wrote to memory of 4180 748 cmd.exe 100 PID 748 wrote to memory of 652 748 cmd.exe 99 PID 748 wrote to memory of 652 748 cmd.exe 99 PID 748 wrote to memory of 2764 748 cmd.exe 98 PID 748 wrote to memory of 2764 748 cmd.exe 98 PID 748 wrote to memory of 3132 748 cmd.exe 97 PID 748 wrote to memory of 3132 748 cmd.exe 97 PID 748 wrote to memory of 3604 748 cmd.exe 96 PID 748 wrote to memory of 3604 748 cmd.exe 96 PID 748 wrote to memory of 3612 748 cmd.exe 95 PID 748 wrote to memory of 3612 748 cmd.exe 95 PID 748 wrote to memory of 1680 748 cmd.exe 94 PID 748 wrote to memory of 1680 748 cmd.exe 94 PID 748 wrote to memory of 3668 748 cmd.exe 93 PID 748 wrote to memory of 3668 748 cmd.exe 93 PID 748 wrote to memory of 2036 748 cmd.exe 91 PID 748 wrote to memory of 2036 748 cmd.exe 91 PID 748 wrote to memory of 980 748 cmd.exe 90 PID 748 wrote to memory of 980 748 cmd.exe 90 PID 748 wrote to memory of 4044 748 cmd.exe 92 PID 748 wrote to memory of 4044 748 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Amazon.exe"C:\Users\Admin\AppData\Local\Temp\Amazon.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1976
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:628
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2240
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:724
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1320
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:980
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2036
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4044
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3668
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1680
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3612
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3604
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3132
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2764
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:652
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4180
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:232
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4188
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1668
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4052
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3220
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4460
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2428
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1388
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3336
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3160
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:676
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4368
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3328
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4960
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:508
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2852
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4480
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2692
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3920
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4136
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3620
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1412
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3632
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2980
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3912
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2640
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4904
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4908
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3832
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4056
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1216
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3748
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1752
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3808
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4768
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2520
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2628
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4668
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1012
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:1620
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5104
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2940
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4584
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2300
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5128
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5152
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5164
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5200
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5188
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5220
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5252
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5360
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5372
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5388
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5408
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5472
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5480
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5496
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5532
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5572
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5580
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5648
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5656
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5712
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5720
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5744
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5760
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5776
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5812
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5836
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5916
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5960
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5948
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6004
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6020
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6028
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6056
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6100
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4612
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6148
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3296
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5680
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2960
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2012
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2712
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6312
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6304
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6364
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6392
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6376
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6356
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6348
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6340
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6332
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6320
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6588
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6620
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6612
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6604
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6596
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6732
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6748
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6760
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6816
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6836
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6864
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6856
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6848
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7008
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7000
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6992
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6984
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6976
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6968
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:6960
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7156
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2352
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:2112
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:3448
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:4292
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7192
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7224
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7284
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7312
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7304
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7296
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7400
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7412
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7456
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7448
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7440
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7432
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7424
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7640
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7632
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7624
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7616
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7608
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7592
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7584
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7576
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7568
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7560
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7552
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7652
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7544
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7532
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7524
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7868
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7860
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7844
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7832
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7824
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7816
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7804
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7788
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7776
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7764
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7752
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7740
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7728
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7720
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7708
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7696
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7684
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7668
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7516
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7508
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7500
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7492
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7484
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7476
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:7464
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:8864
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:8856
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:8836
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:8872
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:8900
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:8880
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9220
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9252
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9228
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9300
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9292
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9308
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9284
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9276
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9380
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9368
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9356
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9336
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9324
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9268
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9260
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9776
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9880
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9864
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9852
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9956
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:9984
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10012
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10156
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10148
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10140
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10132
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10124
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10224
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10216
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10208
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10200
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10192
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10184
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10176
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10168
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10116
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10108
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10100
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10568
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10596
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10644
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10636
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10628
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10620
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10612
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10652
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10848
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10884
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10900
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10916
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10948
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10940
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10932
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10924
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11108
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11172
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11180
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11164
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11224
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11216
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11208
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11200
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11192
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11156
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11148
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11140
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11372
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11404
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11396
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11496
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11560
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11552
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11544
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11536
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11528
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11520
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11512
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11728
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11788
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11920
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11912
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11904
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11896
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11888
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11880
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11872
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11860
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11852
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11844
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11836
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11828
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11816
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11808
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11796
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11780
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11772
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11764
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11756
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11388
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:5752
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:10096
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:11680
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12368
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12356
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12376
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12440
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12464
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12456
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12448
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12656
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12664
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12648
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12640
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12632
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12624
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12616
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12608
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12600
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12592
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12584
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12560
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:12932
-
-
C:\Windows\system32\notepad.exenotepad.exe3⤵PID:13032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD550bf3a5eb7930f0adf58a3870279d51d
SHA1daadc3d5a63da36874c909f28e29fba72dccf8f1
SHA256a30b0fb4fc8b13eb111781e168ad65c4368b0693f6d2d98e0033c5da6c0067e9
SHA512f0cce8b11a8391c201e90f76fde8840fea68fd3b0130717a69446379019a132655d79b595b93cb9d76ff0ef95efc38cebae05e05836a308cda3a9ccd5f39d76e