Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:14
Behavioral task
behavioral1
Sample
36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe
-
Size
376KB
-
MD5
36c6df3adcc499f5636450ee9f5ac8a0
-
SHA1
7518f981378c0aa4be6989e355a44726b3a04d23
-
SHA256
5f2f087aff6eaa0b98dfad731accaaa7ed9d303cd9e888af9e81f93557bf12a0
-
SHA512
a35c26ba50bae2341ffa93d10f623950671893c96a0530f74f0c16637043defa28f5e387267a4ac78e0db7987059d5c30f1bd726502870aa2e104af9f30283f7
-
SSDEEP
6144:HPhftdcNdPePhftdcNdP66dporo4rM6Ld9f71NYt5gfzDVlVXgOd:HPQdPePQdPdZILd9fQt5GpX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240612531.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240621500.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240624062.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240603343.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240603796.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240609281.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240600984.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240601093.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240602968.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240604343.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240604921.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240611812.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240596015.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240598750.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240615843.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240618250.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240609687.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240605156.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240628406.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240596140.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240621390.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240613453.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240624328.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240597343.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240608468.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240620140.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240602343.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240609000.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240604250.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240606921.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240607453.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240627953.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240628656.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240596906.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240603453.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240606687.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240609203.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240614625.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240598859.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240606468.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240610453.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240612406.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240617937.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240625296.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240627859.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240597828.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240607687.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation Process not Found Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation tmp240610031.exe -
Executes dropped EXE 64 IoCs
pid Process 4852 tmp240595562.exe 1472 tmp240595578.exe 2676 tmp240595593.exe 1732 tmp240595609.exe 3340 notpad.exe 3892 tmp240595750.exe 2044 tmp240595781.exe 1260 notpad.exe 2584 tmp240595890.exe 1480 tmp240595921.exe 5076 notpad.exe 2412 tmp240596015.exe 2924 tmp240596031.exe 3400 notpad.exe 4476 tmp240596140.exe 3416 tmp240596156.exe 1044 notpad.exe 2072 tmp240596265.exe 748 tmp240596281.exe 928 notpad.exe 3316 tmp240596390.exe 1332 tmp240596406.exe 4920 notpad.exe 3736 tmp240596515.exe 1840 tmp240596531.exe 3940 notpad.exe 4408 tmp240596640.exe 1196 tmp240596656.exe 1912 notpad.exe 1476 tmp240596765.exe 3420 tmp240596796.exe 1744 notpad.exe 4720 tmp240596906.exe 2836 tmp240596921.exe 4528 notpad.exe 1480 tmp240597015.exe 2604 tmp240597031.exe 368 notpad.exe 4828 tmp240597109.exe 1464 tmp240597125.exe 3896 notpad.exe 4700 tmp240597234.exe 2104 tmp240597250.exe 3300 notpad.exe 8 tmp240597343.exe 2280 tmp240597375.exe 4252 notpad.exe 3344 tmp240597437.exe 1112 tmp240597453.exe 4492 notpad.exe 3452 tmp240597562.exe 1348 tmp240597578.exe 4940 notpad.exe 4796 tmp240597703.exe 4180 tmp240597718.exe 4664 notpad.exe 2876 tmp240597828.exe 2400 tmp240597843.exe 4448 notpad.exe 5112 tmp240597937.exe 3052 tmp240597953.exe 1744 notpad.exe 2332 tmp240598046.exe 2044 tmp240598062.exe -
resource yara_rule behavioral2/memory/3028-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0008000000023423-8.dat upx behavioral2/memory/1472-9-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1472-37-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3028-32-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x000700000002342c-22.dat upx behavioral2/memory/3340-45-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3340-66-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000023428-52.dat upx behavioral2/memory/1260-70-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1260-89-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5076-112-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5076-93-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3400-134-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1044-156-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/928-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4920-182-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4920-200-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3940-203-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3940-223-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1912-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1912-246-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1744-264-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4528-266-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4528-281-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/368-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/368-298-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3896-301-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3896-315-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3300-317-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3300-332-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4252-348-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4492-351-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4492-365-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4940-369-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4940-382-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4664-385-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4664-399-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4448-401-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4448-416-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1744-432-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4528-435-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4528-449-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1464-465-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3184-481-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4144-497-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3548-500-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3548-514-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3104-517-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3104-531-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2360-534-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2360-548-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2560-564-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1936-567-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1936-581-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1952-583-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1952-598-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3916-601-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3916-615-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2704-631-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2264-635-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2264-648-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/928-651-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/928-665-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp240596140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240597437.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240598953.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240605859.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240597109.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600609.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240615843.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe tmp240600234.exe File created C:\Windows\SysWOW64\notpad.exe tmp240604250.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240611812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240616546.exe File created C:\Windows\SysWOW64\notpad.exe- Process not Found File created C:\Windows\SysWOW64\notpad.exe- Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240599437.exe File created C:\Windows\SysWOW64\notpad.exe tmp240601375.exe File created C:\Windows\SysWOW64\notpad.exe tmp240607578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240609859.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240613093.exe File created C:\Windows\SysWOW64\notpad.exe tmp240622453.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240596140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240601187.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240601843.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240614328.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240616765.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240595750.exe File created C:\Windows\SysWOW64\notpad.exe tmp240596906.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240600875.exe File created C:\Windows\SysWOW64\notpad.exe tmp240602968.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- Process not Found File created C:\Windows\SysWOW64\notpad.exe- Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240597562.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240601187.exe File created C:\Windows\SysWOW64\notpad.exe tmp240606578.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240625203.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe- tmp240606125.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240607937.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240601750.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240602500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240596015.exe File created C:\Windows\SysWOW64\notpad.exe tmp240602250.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240620265.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240621500.exe File created C:\Windows\SysWOW64\notpad.exe tmp240599828.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240601375.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240610109.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240610359.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240613296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240628203.exe File created C:\Windows\SysWOW64\notpad.exe Process not Found File created C:\Windows\SysWOW64\notpad.exe tmp240608265.exe File created C:\Windows\SysWOW64\notpad.exe tmp240611812.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240615093.exe File created C:\Windows\SysWOW64\notpad.exe tmp240621140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp Process not Found File created C:\Windows\SysWOW64\notpad.exe tmp240601843.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240615718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240605312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240607578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240608171.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240595890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240600234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240611812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240599578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240608265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598859.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240608671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240619796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240627593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240602156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240609625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614625.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626546.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240596640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240598953.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240603875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240606578.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240624062.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240623562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628093.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 4852 3028 36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe 84 PID 3028 wrote to memory of 4852 3028 36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe 84 PID 3028 wrote to memory of 4852 3028 36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe 84 PID 3028 wrote to memory of 1472 3028 36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe 85 PID 3028 wrote to memory of 1472 3028 36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe 85 PID 3028 wrote to memory of 1472 3028 36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe 85 PID 1472 wrote to memory of 2676 1472 tmp240595578.exe 86 PID 1472 wrote to memory of 2676 1472 tmp240595578.exe 86 PID 1472 wrote to memory of 2676 1472 tmp240595578.exe 86 PID 1472 wrote to memory of 1732 1472 tmp240595578.exe 87 PID 1472 wrote to memory of 1732 1472 tmp240595578.exe 87 PID 1472 wrote to memory of 1732 1472 tmp240595578.exe 87 PID 4852 wrote to memory of 3340 4852 tmp240595562.exe 88 PID 4852 wrote to memory of 3340 4852 tmp240595562.exe 88 PID 4852 wrote to memory of 3340 4852 tmp240595562.exe 88 PID 3340 wrote to memory of 3892 3340 notpad.exe 89 PID 3340 wrote to memory of 3892 3340 notpad.exe 89 PID 3340 wrote to memory of 3892 3340 notpad.exe 89 PID 3340 wrote to memory of 2044 3340 notpad.exe 90 PID 3340 wrote to memory of 2044 3340 notpad.exe 90 PID 3340 wrote to memory of 2044 3340 notpad.exe 90 PID 3892 wrote to memory of 1260 3892 tmp240595750.exe 91 PID 3892 wrote to memory of 1260 3892 tmp240595750.exe 91 PID 3892 wrote to memory of 1260 3892 tmp240595750.exe 91 PID 1260 wrote to memory of 2584 1260 notpad.exe 92 PID 1260 wrote to memory of 2584 1260 notpad.exe 92 PID 1260 wrote to memory of 2584 1260 notpad.exe 92 PID 1260 wrote to memory of 1480 1260 notpad.exe 121 PID 1260 wrote to memory of 1480 1260 notpad.exe 121 PID 1260 wrote to memory of 1480 1260 notpad.exe 121 PID 2584 wrote to memory of 5076 2584 tmp240595890.exe 94 PID 2584 wrote to memory of 5076 2584 tmp240595890.exe 94 PID 2584 wrote to memory of 5076 2584 tmp240595890.exe 94 PID 5076 wrote to memory of 2412 5076 notpad.exe 95 PID 5076 wrote to memory of 2412 5076 notpad.exe 95 PID 5076 wrote to memory of 2412 5076 notpad.exe 95 PID 5076 wrote to memory of 2924 5076 notpad.exe 96 PID 5076 wrote to memory of 2924 5076 notpad.exe 96 PID 5076 wrote to memory of 2924 5076 notpad.exe 96 PID 2412 wrote to memory of 3400 2412 tmp240596015.exe 97 PID 2412 wrote to memory of 3400 2412 tmp240596015.exe 97 PID 2412 wrote to memory of 3400 2412 tmp240596015.exe 97 PID 3400 wrote to memory of 4476 3400 notpad.exe 98 PID 3400 wrote to memory of 4476 3400 notpad.exe 98 PID 3400 wrote to memory of 4476 3400 notpad.exe 98 PID 3400 wrote to memory of 3416 3400 notpad.exe 99 PID 3400 wrote to memory of 3416 3400 notpad.exe 99 PID 3400 wrote to memory of 3416 3400 notpad.exe 99 PID 4476 wrote to memory of 1044 4476 tmp240596140.exe 100 PID 4476 wrote to memory of 1044 4476 tmp240596140.exe 100 PID 4476 wrote to memory of 1044 4476 tmp240596140.exe 100 PID 1044 wrote to memory of 2072 1044 notpad.exe 101 PID 1044 wrote to memory of 2072 1044 notpad.exe 101 PID 1044 wrote to memory of 2072 1044 notpad.exe 101 PID 1044 wrote to memory of 748 1044 notpad.exe 102 PID 1044 wrote to memory of 748 1044 notpad.exe 102 PID 1044 wrote to memory of 748 1044 notpad.exe 102 PID 2072 wrote to memory of 928 2072 tmp240596265.exe 190 PID 2072 wrote to memory of 928 2072 tmp240596265.exe 190 PID 2072 wrote to memory of 928 2072 tmp240596265.exe 190 PID 928 wrote to memory of 3316 928 notpad.exe 104 PID 928 wrote to memory of 3316 928 notpad.exe 104 PID 928 wrote to memory of 3316 928 notpad.exe 104 PID 928 wrote to memory of 1332 928 notpad.exe 193
Processes
-
C:\Users\Admin\AppData\Local\Temp\36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\36c6df3adcc499f5636450ee9f5ac8a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\tmp240595562.exeC:\Users\Admin\AppData\Local\Temp\tmp240595562.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\tmp240595750.exeC:\Users\Admin\AppData\Local\Temp\tmp240595750.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\tmp240595890.exeC:\Users\Admin\AppData\Local\Temp\tmp240595890.exe6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\tmp240596015.exeC:\Users\Admin\AppData\Local\Temp\tmp240596015.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\tmp240596140.exeC:\Users\Admin\AppData\Local\Temp\tmp240596140.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\tmp240596265.exeC:\Users\Admin\AppData\Local\Temp\tmp240596265.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\tmp240596390.exeC:\Users\Admin\AppData\Local\Temp\tmp240596390.exe14⤵
- Executes dropped EXE
PID:3316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\tmp240596515.exeC:\Users\Admin\AppData\Local\Temp\tmp240596515.exe16⤵
- Executes dropped EXE
PID:3736 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\tmp240596640.exeC:\Users\Admin\AppData\Local\Temp\tmp240596640.exe18⤵
- Executes dropped EXE
- Modifies registry class
PID:4408 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\tmp240596765.exeC:\Users\Admin\AppData\Local\Temp\tmp240596765.exe20⤵
- Executes dropped EXE
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\tmp240596906.exeC:\Users\Admin\AppData\Local\Temp\tmp240596906.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4720 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\tmp240597015.exeC:\Users\Admin\AppData\Local\Temp\tmp240597015.exe24⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:368 -
C:\Users\Admin\AppData\Local\Temp\tmp240597109.exeC:\Users\Admin\AppData\Local\Temp\tmp240597109.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4828 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\tmp240597234.exeC:\Users\Admin\AppData\Local\Temp\tmp240597234.exe28⤵
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\tmp240597343.exeC:\Users\Admin\AppData\Local\Temp\tmp240597343.exe30⤵
- Checks computer location settings
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\tmp240597437.exeC:\Users\Admin\AppData\Local\Temp\tmp240597437.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3344 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\tmp240597562.exeC:\Users\Admin\AppData\Local\Temp\tmp240597562.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3452 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\tmp240597703.exeC:\Users\Admin\AppData\Local\Temp\tmp240597703.exe36⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\tmp240597828.exeC:\Users\Admin\AppData\Local\Temp\tmp240597828.exe38⤵
- Checks computer location settings
- Executes dropped EXE
PID:2876 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\tmp240597937.exeC:\Users\Admin\AppData\Local\Temp\tmp240597937.exe40⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\tmp240598046.exeC:\Users\Admin\AppData\Local\Temp\tmp240598046.exe42⤵
- Executes dropped EXE
PID:2332 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\tmp240598140.exeC:\Users\Admin\AppData\Local\Temp\tmp240598140.exe44⤵PID:1864
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\tmp240598250.exeC:\Users\Admin\AppData\Local\Temp\tmp240598250.exe46⤵PID:1404
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\tmp240598343.exeC:\Users\Admin\AppData\Local\Temp\tmp240598343.exe48⤵PID:2808
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\tmp240598468.exeC:\Users\Admin\AppData\Local\Temp\tmp240598468.exe50⤵PID:2644
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\tmp240598562.exeC:\Users\Admin\AppData\Local\Temp\tmp240598562.exe52⤵PID:3568
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\tmp240598671.exeC:\Users\Admin\AppData\Local\Temp\tmp240598671.exe54⤵PID:1348
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\tmp240598750.exeC:\Users\Admin\AppData\Local\Temp\tmp240598750.exe56⤵
- Checks computer location settings
- Modifies registry class
PID:4456 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\tmp240598859.exeC:\Users\Admin\AppData\Local\Temp\tmp240598859.exe58⤵
- Checks computer location settings
- Modifies registry class
PID:1344 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp240598953.exeC:\Users\Admin\AppData\Local\Temp\tmp240598953.exe60⤵
- Drops file in System32 directory
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\tmp240599062.exeC:\Users\Admin\AppData\Local\Temp\tmp240599062.exe62⤵PID:4116
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\tmp240599156.exeC:\Users\Admin\AppData\Local\Temp\tmp240599156.exe64⤵PID:1792
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\tmp240599250.exeC:\Users\Admin\AppData\Local\Temp\tmp240599250.exe66⤵PID:1464
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\tmp240599328.exeC:\Users\Admin\AppData\Local\Temp\tmp240599328.exe68⤵PID:2460
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\tmp240599437.exeC:\Users\Admin\AppData\Local\Temp\tmp240599437.exe70⤵
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\tmp240599578.exeC:\Users\Admin\AppData\Local\Temp\tmp240599578.exe72⤵
- Modifies registry class
PID:1184 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\tmp240599703.exeC:\Users\Admin\AppData\Local\Temp\tmp240599703.exe74⤵PID:3028
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\tmp240599828.exeC:\Users\Admin\AppData\Local\Temp\tmp240599828.exe76⤵
- Drops file in System32 directory
PID:1472 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\tmp240599921.exeC:\Users\Admin\AppData\Local\Temp\tmp240599921.exe78⤵PID:2064
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\tmp240600031.exeC:\Users\Admin\AppData\Local\Temp\tmp240600031.exe80⤵PID:4720
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\tmp240600125.exeC:\Users\Admin\AppData\Local\Temp\tmp240600125.exe82⤵PID:1056
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\tmp240600234.exeC:\Users\Admin\AppData\Local\Temp\tmp240600234.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:3896 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\tmp240600328.exeC:\Users\Admin\AppData\Local\Temp\tmp240600328.exe86⤵PID:3300
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\tmp240600421.exeC:\Users\Admin\AppData\Local\Temp\tmp240600421.exe88⤵PID:5108
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\tmp240600500.exeC:\Users\Admin\AppData\Local\Temp\tmp240600500.exe90⤵PID:2040
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\tmp240600609.exeC:\Users\Admin\AppData\Local\Temp\tmp240600609.exe92⤵
- Drops file in System32 directory
PID:3940 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\tmp240600703.exeC:\Users\Admin\AppData\Local\Temp\tmp240600703.exe94⤵
- Drops file in System32 directory
PID:844 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\tmp240600796.exeC:\Users\Admin\AppData\Local\Temp\tmp240600796.exe96⤵PID:5004
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\tmp240600875.exeC:\Users\Admin\AppData\Local\Temp\tmp240600875.exe98⤵
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\tmp240600984.exeC:\Users\Admin\AppData\Local\Temp\tmp240600984.exe100⤵
- Checks computer location settings
PID:4232 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\tmp240601093.exeC:\Users\Admin\AppData\Local\Temp\tmp240601093.exe102⤵
- Checks computer location settings
PID:3884 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\tmp240601187.exeC:\Users\Admin\AppData\Local\Temp\tmp240601187.exe104⤵
- Drops file in System32 directory
PID:5044 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\tmp240601296.exeC:\Users\Admin\AppData\Local\Temp\tmp240601296.exe106⤵PID:2768
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\tmp240601375.exeC:\Users\Admin\AppData\Local\Temp\tmp240601375.exe108⤵
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\tmp240601546.exeC:\Users\Admin\AppData\Local\Temp\tmp240601546.exe110⤵PID:2324
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\tmp240601640.exeC:\Users\Admin\AppData\Local\Temp\tmp240601640.exe112⤵PID:2476
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\tmp240601750.exeC:\Users\Admin\AppData\Local\Temp\tmp240601750.exe114⤵
- Drops file in System32 directory
PID:468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\tmp240601843.exeC:\Users\Admin\AppData\Local\Temp\tmp240601843.exe116⤵
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\tmp240601937.exeC:\Users\Admin\AppData\Local\Temp\tmp240601937.exe118⤵PID:4984
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\tmp240602046.exeC:\Users\Admin\AppData\Local\Temp\tmp240602046.exe120⤵PID:2824
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\tmp240602156.exeC:\Users\Admin\AppData\Local\Temp\tmp240602156.exe122⤵
- Modifies registry class
PID:888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-