Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 20:38 UTC
Behavioral task
behavioral1
Sample
c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe
Resource
win10v2004-20220812-en
General
-
Target
c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe
-
Size
1.3MB
-
MD5
a106560a61ac40d575bf8dfba62229a7
-
SHA1
5e2dbc801e06b86ced4499115567634131f5adb6
-
SHA256
c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912
-
SHA512
5ad8fe689297f888b12676078960d40bfcb457f59b30cdc7527870a79ff6bec0389ca621069dc88dbcf40b44662c8c304d0d50af6f2a80c5b8b91fc49447cd08
-
SSDEEP
24576:OR1RgRJRmRWRJRbR9RCRwR8RvRhR3R8RARTR9RTRIRkReRJRPRkR:OR1RgRJRmRWRJRbR9RCRwR8RvRhR3R8w
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1160 tmp7087156.exe 1808 tmp7087187.exe 908 tmp7087265.exe 1148 tmp7087375.exe 872 tmp7087546.exe 1784 tmp7087843.exe 1080 notpad.exe 984 tmp7088326.exe 1216 notpad.exe 2000 tmp7088389.exe 1972 tmp7088576.exe 824 tmp7088903.exe 288 tmp7088685.exe 2020 notpad.exe 2040 tmp7089449.exe 1668 tmp7089559.exe 1704 tmp7089309.exe 860 notpad.exe 2012 tmp7089949.exe 1312 tmp7089886.exe 1808 notpad.exe 760 tmp7090027.exe 520 tmp7090385.exe 660 tmp7090058.exe 1788 tmp7093334.exe 1736 notpad.exe 1148 tmp7093989.exe 1304 tmp7094395.exe 1852 tmp7094488.exe 1604 tmp7094348.exe 1612 tmp7094691.exe 1368 notpad.exe 788 tmp7094909.exe 1592 tmp7095065.exe 1832 tmp7095268.exe 2044 tmp7095533.exe 1676 tmp7095627.exe 2024 notpad.exe 1572 tmp7096376.exe 1216 tmp7096547.exe 1288 tmp7096719.exe 1972 tmp7096594.exe 1172 notpad.exe 1108 tmp7097156.exe 1176 tmp7097249.exe 1328 tmp7097624.exe 1440 notpad.exe 1540 tmp7097468.exe 852 tmp7098248.exe 1624 tmp7098263.exe 552 tmp7098466.exe 1744 notpad.exe 804 tmp7098716.exe 860 tmp7098997.exe 1764 tmp7099433.exe 1340 tmp7099387.exe 1508 tmp7099808.exe 240 notpad.exe 1360 tmp7100057.exe 1788 tmp7100245.exe 1884 tmp7103567.exe 1736 tmp7102928.exe 1148 notpad.exe 1348 tmp7104020.exe -
resource yara_rule behavioral1/files/0x00080000000142c8-60.dat upx behavioral1/memory/1712-64-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000142c8-63.dat upx behavioral1/files/0x00080000000142c8-59.dat upx behavioral1/files/0x00080000000142c8-62.dat upx behavioral1/files/0x000600000001468b-71.dat upx behavioral1/files/0x000600000001468b-70.dat upx behavioral1/files/0x000600000001468b-73.dat upx behavioral1/files/0x000600000001468b-75.dat upx behavioral1/memory/1808-74-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000014ab1-82.dat upx behavioral1/files/0x0007000000014b4c-83.dat upx behavioral1/files/0x0007000000014b4c-84.dat upx behavioral1/files/0x0007000000014b4c-86.dat upx behavioral1/memory/908-87-0x0000000002630000-0x000000000264F000-memory.dmp upx behavioral1/memory/1148-88-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000014b4c-89.dat upx behavioral1/files/0x0007000000014ab1-95.dat upx behavioral1/files/0x0007000000014ab1-96.dat upx behavioral1/files/0x0007000000014ab1-93.dat upx behavioral1/files/0x0006000000014930-102.dat upx behavioral1/files/0x0007000000014ab1-106.dat upx behavioral1/files/0x0007000000014ab1-105.dat upx behavioral1/files/0x0007000000014ab1-108.dat upx behavioral1/files/0x0006000000014f9d-110.dat upx behavioral1/files/0x0006000000014f9d-114.dat upx behavioral1/memory/1784-115-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0006000000014f9d-111.dat upx behavioral1/files/0x0006000000014f9d-113.dat upx behavioral1/files/0x0006000000014930-121.dat upx behavioral1/memory/1216-133-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000014ab1-137.dat upx behavioral1/files/0x0007000000014ab1-135.dat upx behavioral1/files/0x0007000000014ab1-134.dat upx behavioral1/files/0x0006000000014930-146.dat upx behavioral1/memory/2020-150-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00070000000155fa-151.dat upx behavioral1/memory/2000-153-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/860-157-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1704-160-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1080-161-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/860-164-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1808-165-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1704-172-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1808-174-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1736-184-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/660-188-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1604-190-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/788-194-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1368-195-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1368-200-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/788-202-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2024-208-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1676-213-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1172-216-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1972-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1172-222-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1972-224-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1440-231-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1540-235-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/804-239-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1744-241-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1744-236-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/240-246-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 64 IoCs
pid Process 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 1808 tmp7087187.exe 1808 tmp7087187.exe 1808 tmp7087187.exe 1808 tmp7087187.exe 1148 tmp7087375.exe 1148 tmp7087375.exe 908 tmp7087265.exe 1148 tmp7087375.exe 1148 tmp7087375.exe 1784 tmp7087843.exe 1784 tmp7087843.exe 908 tmp7087265.exe 1080 notpad.exe 1080 notpad.exe 984 tmp7088326.exe 984 tmp7088326.exe 1784 tmp7087843.exe 1784 tmp7087843.exe 1216 notpad.exe 1216 notpad.exe 2000 tmp7088389.exe 2000 tmp7088389.exe 1216 notpad.exe 1972 tmp7088576.exe 1972 tmp7088576.exe 2020 notpad.exe 2020 notpad.exe 2020 notpad.exe 2000 tmp7088389.exe 2000 tmp7088389.exe 2040 tmp7089449.exe 2040 tmp7089449.exe 1704 tmp7089309.exe 860 notpad.exe 1704 tmp7089309.exe 860 notpad.exe 860 notpad.exe 1312 tmp7089886.exe 1312 tmp7089886.exe 1808 notpad.exe 1808 notpad.exe 1704 tmp7089309.exe 1704 tmp7089309.exe 1808 notpad.exe 660 tmp7090058.exe 660 tmp7090058.exe 520 tmp7090385.exe 520 tmp7090385.exe 1736 notpad.exe 1736 notpad.exe 1736 notpad.exe 660 tmp7090058.exe 660 tmp7090058.exe 1604 tmp7094348.exe 1604 tmp7094348.exe 1148 tmp7093989.exe 1148 tmp7093989.exe 1604 tmp7094348.exe 1604 tmp7094348.exe 1368 notpad.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7118668.exe File created C:\Windows\SysWOW64\notpad.exe tmp7126905.exe File created C:\Windows\SysWOW64\notpad.exe tmp7112662.exe File opened for modification C:\Windows\SysWOW64\fsb.stb notpad.exe File opened for modification C:\Windows\SysWOW64\fsb.stb notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7089449.exe File created C:\Windows\SysWOW64\notpad.exe tmp7109402.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7122709.exe File created C:\Windows\SysWOW64\notpad.exe notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7136920.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7147981.exe File created C:\Windows\SysWOW64\notpad.exe tmp7188541.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7214235.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7088326.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7148496.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7125657.exe File created C:\Windows\SysWOW64\notpad.exe tmp7175811.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7155079.exe File created C:\Windows\SysWOW64\notpad.exe tmp7104020.exe File created C:\Windows\SysWOW64\notpad.exe tmp7120166.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7214235.exe File created C:\Windows\SysWOW64\notpad.exe tmp7088326.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7090385.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7152224.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7192394.exe File created C:\Windows\SysWOW64\notpad.exe tmp7097156.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7118668.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7196123.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7187246.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7087265.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7104909.exe File created C:\Windows\SysWOW64\notpad.exe tmp7108840.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7109402.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7156077.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7187246.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7188541.exe File opened for modification C:\Windows\SysWOW64\fsb.stb notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7116703.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7156218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7168791.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7125657.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7138621.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7175811.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7090385.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7112662.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7144502.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7167590.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7104020.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7174548.exe File created C:\Windows\SysWOW64\notpad.exe tmp7152224.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7180351.exe File created C:\Windows\SysWOW64\notpad.exe tmp7196123.exe File created C:\Windows\SysWOW64\notpad.exe tmp7208447.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7105018.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7147981.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7174548.exe File created C:\Windows\SysWOW64\notpad.exe tmp7180351.exe File created C:\Windows\SysWOW64\notpad.exe tmp7156077.exe File opened for modification C:\Windows\SysWOW64\fsb.stb notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7098997.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7117654.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7186778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7222768.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7116703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7174548.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7151538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7190897.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7096376.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7212113.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7123364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7125657.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7155656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7166529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7097156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7098997.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7108840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7120166.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7189212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7118668.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7126905.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7176420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7089886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7104020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7104909.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7106282.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7153223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7150181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7098248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7126297.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7175811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7180351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7166966.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7136920.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7147981.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7138075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7087265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7106032.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7144081.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7109402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7148496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7144502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7192394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7163737.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7167590.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7172083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7156218.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7156592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7154439.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7156077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7155079.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7088576.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7095065.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7145048.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7196123.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7139370.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7214235.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7205124.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7093989.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1160 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 27 PID 1712 wrote to memory of 1160 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 27 PID 1712 wrote to memory of 1160 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 27 PID 1712 wrote to memory of 1160 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 27 PID 1712 wrote to memory of 1808 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 28 PID 1712 wrote to memory of 1808 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 28 PID 1712 wrote to memory of 1808 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 28 PID 1712 wrote to memory of 1808 1712 c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe 28 PID 1808 wrote to memory of 908 1808 tmp7087187.exe 29 PID 1808 wrote to memory of 908 1808 tmp7087187.exe 29 PID 1808 wrote to memory of 908 1808 tmp7087187.exe 29 PID 1808 wrote to memory of 908 1808 tmp7087187.exe 29 PID 1808 wrote to memory of 1148 1808 tmp7087187.exe 30 PID 1808 wrote to memory of 1148 1808 tmp7087187.exe 30 PID 1808 wrote to memory of 1148 1808 tmp7087187.exe 30 PID 1808 wrote to memory of 1148 1808 tmp7087187.exe 30 PID 1148 wrote to memory of 872 1148 tmp7087375.exe 31 PID 1148 wrote to memory of 872 1148 tmp7087375.exe 31 PID 1148 wrote to memory of 872 1148 tmp7087375.exe 31 PID 1148 wrote to memory of 872 1148 tmp7087375.exe 31 PID 1148 wrote to memory of 1784 1148 tmp7087375.exe 33 PID 1148 wrote to memory of 1784 1148 tmp7087375.exe 33 PID 1148 wrote to memory of 1784 1148 tmp7087375.exe 33 PID 1148 wrote to memory of 1784 1148 tmp7087375.exe 33 PID 1784 wrote to memory of 984 1784 tmp7087843.exe 34 PID 1784 wrote to memory of 984 1784 tmp7087843.exe 34 PID 1784 wrote to memory of 984 1784 tmp7087843.exe 34 PID 1784 wrote to memory of 984 1784 tmp7087843.exe 34 PID 908 wrote to memory of 1080 908 tmp7087265.exe 32 PID 908 wrote to memory of 1080 908 tmp7087265.exe 32 PID 908 wrote to memory of 1080 908 tmp7087265.exe 32 PID 908 wrote to memory of 1080 908 tmp7087265.exe 32 PID 1080 wrote to memory of 372 1080 notpad.exe 35 PID 1080 wrote to memory of 372 1080 notpad.exe 35 PID 1080 wrote to memory of 372 1080 notpad.exe 35 PID 1080 wrote to memory of 372 1080 notpad.exe 35 PID 984 wrote to memory of 1216 984 tmp7088326.exe 36 PID 984 wrote to memory of 1216 984 tmp7088326.exe 36 PID 984 wrote to memory of 1216 984 tmp7088326.exe 36 PID 984 wrote to memory of 1216 984 tmp7088326.exe 36 PID 1784 wrote to memory of 2000 1784 tmp7087843.exe 37 PID 1784 wrote to memory of 2000 1784 tmp7087843.exe 37 PID 1784 wrote to memory of 2000 1784 tmp7087843.exe 37 PID 1784 wrote to memory of 2000 1784 tmp7087843.exe 37 PID 1216 wrote to memory of 1972 1216 notpad.exe 38 PID 1216 wrote to memory of 1972 1216 notpad.exe 38 PID 1216 wrote to memory of 1972 1216 notpad.exe 38 PID 1216 wrote to memory of 1972 1216 notpad.exe 38 PID 2000 wrote to memory of 288 2000 tmp7088389.exe 39 PID 2000 wrote to memory of 288 2000 tmp7088389.exe 39 PID 2000 wrote to memory of 288 2000 tmp7088389.exe 39 PID 2000 wrote to memory of 288 2000 tmp7088389.exe 39 PID 1216 wrote to memory of 824 1216 notpad.exe 40 PID 1216 wrote to memory of 824 1216 notpad.exe 40 PID 1216 wrote to memory of 824 1216 notpad.exe 40 PID 1216 wrote to memory of 824 1216 notpad.exe 40 PID 1972 wrote to memory of 2020 1972 tmp7088576.exe 41 PID 1972 wrote to memory of 2020 1972 tmp7088576.exe 41 PID 1972 wrote to memory of 2020 1972 tmp7088576.exe 41 PID 1972 wrote to memory of 2020 1972 tmp7088576.exe 41 PID 2020 wrote to memory of 2040 2020 notpad.exe 42 PID 2020 wrote to memory of 2040 2020 notpad.exe 42 PID 2020 wrote to memory of 2040 2020 notpad.exe 42 PID 2020 wrote to memory of 2040 2020 notpad.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe"C:\Users\Admin\AppData\Local\Temp\c85e67d1581dc4e1e60f0f39dc7068338b348ec7c3a9ff90c5f768440fef7912.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\tmp7087156.exeC:\Users\Admin\AppData\Local\Temp\tmp7087156.exe2⤵
- Executes dropped EXE
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7087187.exeC:\Users\Admin\AppData\Local\Temp\tmp7087187.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\tmp7087265.exeC:\Users\Admin\AppData\Local\Temp\tmp7087265.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\tmp7088373.exeC:\Users\Admin\AppData\Local\Temp\tmp7088373.exe5⤵PID:372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7087375.exeC:\Users\Admin\AppData\Local\Temp\tmp7087375.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\tmp7087546.exeC:\Users\Admin\AppData\Local\Temp\tmp7087546.exe4⤵
- Executes dropped EXE
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7087843.exeC:\Users\Admin\AppData\Local\Temp\tmp7087843.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\tmp7088326.exeC:\Users\Admin\AppData\Local\Temp\tmp7088326.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\tmp7088576.exeC:\Users\Admin\AppData\Local\Temp\tmp7088576.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\tmp7089449.exeC:\Users\Admin\AppData\Local\Temp\tmp7089449.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Users\Admin\AppData\Local\Temp\tmp7089949.exeC:\Users\Admin\AppData\Local\Temp\tmp7089949.exe11⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7090027.exeC:\Users\Admin\AppData\Local\Temp\tmp7090027.exe11⤵
- Executes dropped EXE
PID:760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7089559.exeC:\Users\Admin\AppData\Local\Temp\tmp7089559.exe9⤵
- Executes dropped EXE
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7088903.exeC:\Users\Admin\AppData\Local\Temp\tmp7088903.exe7⤵
- Executes dropped EXE
PID:824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7088389.exeC:\Users\Admin\AppData\Local\Temp\tmp7088389.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\tmp7088685.exeC:\Users\Admin\AppData\Local\Temp\tmp7088685.exe6⤵
- Executes dropped EXE
PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7089309.exeC:\Users\Admin\AppData\Local\Temp\tmp7089309.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\tmp7089886.exeC:\Users\Admin\AppData\Local\Temp\tmp7089886.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1312 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\tmp7090385.exeC:\Users\Admin\AppData\Local\Temp\tmp7090385.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:520 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\tmp7094395.exeC:\Users\Admin\AppData\Local\Temp\tmp7094395.exe11⤵
- Executes dropped EXE
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7094488.exeC:\Users\Admin\AppData\Local\Temp\tmp7094488.exe11⤵
- Executes dropped EXE
PID:1852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7093334.exeC:\Users\Admin\AppData\Local\Temp\tmp7093334.exe9⤵
- Executes dropped EXE
PID:1788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7090058.exeC:\Users\Admin\AppData\Local\Temp\tmp7090058.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:660 -
C:\Users\Admin\AppData\Local\Temp\tmp7093989.exeC:\Users\Admin\AppData\Local\Temp\tmp7093989.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1148 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\tmp7095065.exeC:\Users\Admin\AppData\Local\Temp\tmp7095065.exe10⤵
- Executes dropped EXE
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\tmp7096547.exeC:\Users\Admin\AppData\Local\Temp\tmp7096547.exe12⤵
- Executes dropped EXE
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7096719.exeC:\Users\Admin\AppData\Local\Temp\tmp7096719.exe12⤵
- Executes dropped EXE
PID:1288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7095533.exeC:\Users\Admin\AppData\Local\Temp\tmp7095533.exe10⤵
- Executes dropped EXE
PID:2044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7094348.exeC:\Users\Admin\AppData\Local\Temp\tmp7094348.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\tmp7094691.exeC:\Users\Admin\AppData\Local\Temp\tmp7094691.exe9⤵
- Executes dropped EXE
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7094909.exeC:\Users\Admin\AppData\Local\Temp\tmp7094909.exe9⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\tmp7095268.exeC:\Users\Admin\AppData\Local\Temp\tmp7095268.exe10⤵
- Executes dropped EXE
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7095627.exeC:\Users\Admin\AppData\Local\Temp\tmp7095627.exe10⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\tmp7096376.exeC:\Users\Admin\AppData\Local\Temp\tmp7096376.exe11⤵
- Executes dropped EXE
- Modifies registry class
PID:1572 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\tmp7097249.exeC:\Users\Admin\AppData\Local\Temp\tmp7097249.exe13⤵
- Executes dropped EXE
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7097624.exeC:\Users\Admin\AppData\Local\Temp\tmp7097624.exe13⤵
- Executes dropped EXE
PID:1328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7096594.exeC:\Users\Admin\AppData\Local\Temp\tmp7096594.exe11⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\tmp7097156.exeC:\Users\Admin\AppData\Local\Temp\tmp7097156.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\tmp7098248.exeC:\Users\Admin\AppData\Local\Temp\tmp7098248.exe14⤵
- Executes dropped EXE
- Modifies registry class
PID:852 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\tmp7098997.exeC:\Users\Admin\AppData\Local\Temp\tmp7098997.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:240 -
C:\Users\Admin\AppData\Local\Temp\tmp7100245.exeC:\Users\Admin\AppData\Local\Temp\tmp7100245.exe18⤵
- Executes dropped EXE
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7103567.exeC:\Users\Admin\AppData\Local\Temp\tmp7103567.exe18⤵
- Executes dropped EXE
PID:1884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7099433.exeC:\Users\Admin\AppData\Local\Temp\tmp7099433.exe16⤵
- Executes dropped EXE
PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7098466.exeC:\Users\Admin\AppData\Local\Temp\tmp7098466.exe14⤵
- Executes dropped EXE
PID:552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7097468.exeC:\Users\Admin\AppData\Local\Temp\tmp7097468.exe12⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\tmp7098263.exeC:\Users\Admin\AppData\Local\Temp\tmp7098263.exe13⤵
- Executes dropped EXE
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7098716.exeC:\Users\Admin\AppData\Local\Temp\tmp7098716.exe13⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\tmp7099808.exeC:\Users\Admin\AppData\Local\Temp\tmp7099808.exe14⤵
- Executes dropped EXE
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\tmp7100057.exeC:\Users\Admin\AppData\Local\Temp\tmp7100057.exe15⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\tmp7104254.exeC:\Users\Admin\AppData\Local\Temp\tmp7104254.exe17⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7104613.exeC:\Users\Admin\AppData\Local\Temp\tmp7104613.exe17⤵PID:1568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7102928.exeC:\Users\Admin\AppData\Local\Temp\tmp7102928.exe15⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\tmp7104020.exeC:\Users\Admin\AppData\Local\Temp\tmp7104020.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1348 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\tmp7104909.exeC:\Users\Admin\AppData\Local\Temp\tmp7104909.exe18⤵
- Drops file in System32 directory
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\tmp7105845.exeC:\Users\Admin\AppData\Local\Temp\tmp7105845.exe20⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7106173.exeC:\Users\Admin\AppData\Local\Temp\tmp7106173.exe20⤵PID:1676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7105003.exeC:\Users\Admin\AppData\Local\Temp\tmp7105003.exe18⤵PID:2044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7104597.exeC:\Users\Admin\AppData\Local\Temp\tmp7104597.exe16⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\tmp7105018.exeC:\Users\Admin\AppData\Local\Temp\tmp7105018.exe17⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\tmp7106282.exeC:\Users\Admin\AppData\Local\Temp\tmp7106282.exe19⤵
- Modifies registry class
PID:1620 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\tmp7108840.exeC:\Users\Admin\AppData\Local\Temp\tmp7108840.exe21⤵
- Drops file in System32 directory
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\tmp7112225.exeC:\Users\Admin\AppData\Local\Temp\tmp7112225.exe23⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7112678.exeC:\Users\Admin\AppData\Local\Temp\tmp7112678.exe23⤵PID:240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7109121.exeC:\Users\Admin\AppData\Local\Temp\tmp7109121.exe21⤵PID:1356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7107015.exeC:\Users\Admin\AppData\Local\Temp\tmp7107015.exe19⤵PID:1660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7105689.exeC:\Users\Admin\AppData\Local\Temp\tmp7105689.exe17⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\tmp7106032.exeC:\Users\Admin\AppData\Local\Temp\tmp7106032.exe18⤵
- Modifies registry class
PID:1960 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\tmp7107358.exeC:\Users\Admin\AppData\Local\Temp\tmp7107358.exe20⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7107795.exeC:\Users\Admin\AppData\Local\Temp\tmp7107795.exe20⤵PID:1476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7106157.exeC:\Users\Admin\AppData\Local\Temp\tmp7106157.exe18⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\tmp7106687.exeC:\Users\Admin\AppData\Local\Temp\tmp7106687.exe19⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7106984.exeC:\Users\Admin\AppData\Local\Temp\tmp7106984.exe19⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\tmp7107967.exeC:\Users\Admin\AppData\Local\Temp\tmp7107967.exe20⤵PID:948
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\tmp7109402.exeC:\Users\Admin\AppData\Local\Temp\tmp7109402.exe22⤵
- Drops file in System32 directory
- Modifies registry class
PID:616 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\tmp7114768.exeC:\Users\Admin\AppData\Local\Temp\tmp7114768.exe24⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7114909.exeC:\Users\Admin\AppData\Local\Temp\tmp7114909.exe24⤵PID:1612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7112647.exeC:\Users\Admin\AppData\Local\Temp\tmp7112647.exe22⤵PID:520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7108793.exeC:\Users\Admin\AppData\Local\Temp\tmp7108793.exe20⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\tmp7109074.exeC:\Users\Admin\AppData\Local\Temp\tmp7109074.exe21⤵PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7109277.exeC:\Users\Admin\AppData\Local\Temp\tmp7109277.exe21⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\tmp7112662.exeC:\Users\Admin\AppData\Local\Temp\tmp7112662.exe22⤵
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\tmp7116110.exeC:\Users\Admin\AppData\Local\Temp\tmp7116110.exe24⤵PID:1968
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\tmp7116703.exeC:\Users\Admin\AppData\Local\Temp\tmp7116703.exe26⤵
- Drops file in System32 directory
- Modifies registry class
PID:1512 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\tmp7117654.exeC:\Users\Admin\AppData\Local\Temp\tmp7117654.exe28⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\tmp7118668.exeC:\Users\Admin\AppData\Local\Temp\tmp7118668.exe30⤵
- Drops file in System32 directory
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\tmp7119760.exeC:\Users\Admin\AppData\Local\Temp\tmp7119760.exe32⤵PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7119885.exeC:\Users\Admin\AppData\Local\Temp\tmp7119885.exe32⤵PID:1752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7118856.exeC:\Users\Admin\AppData\Local\Temp\tmp7118856.exe30⤵PID:2040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7117748.exeC:\Users\Admin\AppData\Local\Temp\tmp7117748.exe28⤵PID:1872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7116828.exeC:\Users\Admin\AppData\Local\Temp\tmp7116828.exe26⤵PID:980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7116204.exeC:\Users\Admin\AppData\Local\Temp\tmp7116204.exe24⤵PID:1568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7114675.exeC:\Users\Admin\AppData\Local\Temp\tmp7114675.exe22⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\tmp7115486.exeC:\Users\Admin\AppData\Local\Temp\tmp7115486.exe23⤵PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7116250.exeC:\Users\Admin\AppData\Local\Temp\tmp7116250.exe23⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\tmp7116843.exeC:\Users\Admin\AppData\Local\Temp\tmp7116843.exe24⤵PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7117186.exeC:\Users\Admin\AppData\Local\Temp\tmp7117186.exe24⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\tmp7117951.exeC:\Users\Admin\AppData\Local\Temp\tmp7117951.exe25⤵PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7118216.exeC:\Users\Admin\AppData\Local\Temp\tmp7118216.exe25⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\tmp7118700.exeC:\Users\Admin\AppData\Local\Temp\tmp7118700.exe26⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7119043.exeC:\Users\Admin\AppData\Local\Temp\tmp7119043.exe26⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\tmp7119370.exeC:\Users\Admin\AppData\Local\Temp\tmp7119370.exe27⤵PID:2004
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\tmp7120166.exeC:\Users\Admin\AppData\Local\Temp\tmp7120166.exe29⤵
- Drops file in System32 directory
- Modifies registry class
PID:556 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\tmp7121820.exeC:\Users\Admin\AppData\Local\Temp\tmp7121820.exe31⤵PID:1624
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\tmp7122272.exeC:\Users\Admin\AppData\Local\Temp\tmp7122272.exe33⤵PID:520
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\tmp7122709.exeC:\Users\Admin\AppData\Local\Temp\tmp7122709.exe35⤵
- Drops file in System32 directory
PID:1884 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\tmp7123364.exeC:\Users\Admin\AppData\Local\Temp\tmp7123364.exe37⤵
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\tmp7123988.exeC:\Users\Admin\AppData\Local\Temp\tmp7123988.exe39⤵PID:1764
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"40⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\tmp7124565.exeC:\Users\Admin\AppData\Local\Temp\tmp7124565.exe41⤵PID:1968
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\tmp7125096.exeC:\Users\Admin\AppData\Local\Temp\tmp7125096.exe43⤵PID:1300
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\tmp7125657.exeC:\Users\Admin\AppData\Local\Temp\tmp7125657.exe45⤵
- Drops file in System32 directory
- Modifies registry class
PID:980 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\tmp7126297.exeC:\Users\Admin\AppData\Local\Temp\tmp7126297.exe47⤵
- Modifies registry class
PID:2020 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"48⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\tmp7126905.exeC:\Users\Admin\AppData\Local\Temp\tmp7126905.exe49⤵
- Drops file in System32 directory
- Modifies registry class
PID:1580 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"50⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\tmp7127467.exeC:\Users\Admin\AppData\Local\Temp\tmp7127467.exe51⤵PID:1576
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\tmp7132864.exeC:\Users\Admin\AppData\Local\Temp\tmp7132864.exe53⤵PID:1476
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\tmp7134471.exeC:\Users\Admin\AppData\Local\Temp\tmp7134471.exe55⤵PID:1288
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\tmp7135189.exeC:\Users\Admin\AppData\Local\Temp\tmp7135189.exe57⤵PID:1756
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"58⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\tmp7135844.exeC:\Users\Admin\AppData\Local\Temp\tmp7135844.exe59⤵PID:1624
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"60⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\tmp7136390.exeC:\Users\Admin\AppData\Local\Temp\tmp7136390.exe61⤵PID:520
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\tmp7136920.exeC:\Users\Admin\AppData\Local\Temp\tmp7136920.exe63⤵
- Drops file in System32 directory
- Modifies registry class
PID:1120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\tmp7137466.exeC:\Users\Admin\AppData\Local\Temp\tmp7137466.exe65⤵PID:1604
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\tmp7138075.exeC:\Users\Admin\AppData\Local\Temp\tmp7138075.exe67⤵
- Modifies registry class
PID:908 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"68⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\tmp7138621.exeC:\Users\Admin\AppData\Local\Temp\tmp7138621.exe69⤵
- Drops file in System32 directory
PID:1148 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"70⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\tmp7139136.exeC:\Users\Admin\AppData\Local\Temp\tmp7139136.exe71⤵PID:1244
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\tmp7139853.exeC:\Users\Admin\AppData\Local\Temp\tmp7139853.exe73⤵PID:1592
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\tmp7142131.exeC:\Users\Admin\AppData\Local\Temp\tmp7142131.exe75⤵PID:1584
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\tmp7143160.exeC:\Users\Admin\AppData\Local\Temp\tmp7143160.exe77⤵PID:1812
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\tmp7143940.exeC:\Users\Admin\AppData\Local\Temp\tmp7143940.exe79⤵PID:1172
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"80⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\tmp7144502.exeC:\Users\Admin\AppData\Local\Temp\tmp7144502.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:1476 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\tmp7145048.exeC:\Users\Admin\AppData\Local\Temp\tmp7145048.exe83⤵
- Modifies registry class
PID:1660 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\tmp7145594.exeC:\Users\Admin\AppData\Local\Temp\tmp7145594.exe85⤵PID:1160
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\tmp7146187.exeC:\Users\Admin\AppData\Local\Temp\tmp7146187.exe87⤵PID:928
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\tmp7146889.exeC:\Users\Admin\AppData\Local\Temp\tmp7146889.exe89⤵PID:1704
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\tmp7147341.exeC:\Users\Admin\AppData\Local\Temp\tmp7147341.exe91⤵PID:1800
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"92⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\tmp7147903.exeC:\Users\Admin\AppData\Local\Temp\tmp7147903.exe93⤵PID:1808
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"94⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\tmp7148496.exeC:\Users\Admin\AppData\Local\Temp\tmp7148496.exe95⤵
- Drops file in System32 directory
- Modifies registry class
PID:1764 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\tmp7149167.exeC:\Users\Admin\AppData\Local\Temp\tmp7149167.exe97⤵PID:2044
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\tmp7150586.exeC:\Users\Admin\AppData\Local\Temp\tmp7150586.exe99⤵PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7150181.exeC:\Users\Admin\AppData\Local\Temp\tmp7150181.exe99⤵
- Modifies registry class
PID:1268 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\tmp7151538.exeC:\Users\Admin\AppData\Local\Temp\tmp7151538.exe101⤵
- Modifies registry class
PID:1672 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\tmp7152099.exeC:\Users\Admin\AppData\Local\Temp\tmp7152099.exe103⤵PID:1108
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\tmp7152723.exeC:\Users\Admin\AppData\Local\Temp\tmp7152723.exe105⤵PID:1972
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"106⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\tmp7153223.exeC:\Users\Admin\AppData\Local\Temp\tmp7153223.exe107⤵
- Modifies registry class
PID:2040 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\tmp7153847.exeC:\Users\Admin\AppData\Local\Temp\tmp7153847.exe109⤵PID:808
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"110⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\tmp7154439.exeC:\Users\Admin\AppData\Local\Temp\tmp7154439.exe111⤵
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵
- Drops file in System32 directory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\tmp7155079.exeC:\Users\Admin\AppData\Local\Temp\tmp7155079.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:1356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"114⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\tmp7155656.exeC:\Users\Admin\AppData\Local\Temp\tmp7155656.exe115⤵
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\tmp7156077.exeC:\Users\Admin\AppData\Local\Temp\tmp7156077.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:1816 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\tmp7156592.exeC:\Users\Admin\AppData\Local\Temp\tmp7156592.exe119⤵
- Modifies registry class
PID:1800 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"120⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\tmp7157185.exeC:\Users\Admin\AppData\Local\Temp\tmp7157185.exe121⤵PID:1964
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"122⤵PID:1364
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-