Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 15:49
Behavioral task
behavioral1
Sample
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe
Resource
win10v2004-20220812-en
General
-
Target
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe
-
Size
417KB
-
MD5
0d11186c3f51c46ed8f1899275cb5eb6
-
SHA1
00dc60a9fcc6cd3241984b7f4f62a39143b56608
-
SHA256
c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f
-
SHA512
84e2ee4b4079fdd2606e0ea3532120ab876262165ac2346c778abb89fe771c0c696ffd568025c01316fd18c8e7fae896f118f62c8ada45629da796d0cae6e09c
-
SSDEEP
6144:HPOXhCRhrDPePOXhCRhrDPuPOXhCRhrDPGJDJ:HPhR9PePhR9PuPhR9PGJDJ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1172 tmp7096220.exe 1748 tmp7096329.exe 1408 tmp7096469.exe 1116 tmp7096625.exe 1204 tmp7096735.exe 2040 tmp7096859.exe 1680 notpad.exe 1740 tmp7098622.exe 1052 tmp7098700.exe 1292 notpad.exe 468 tmp7098919.exe 2012 notpad.exe 820 tmp7099090.exe 1528 tmp7099371.exe 1132 notpad.exe 536 tmp7099683.exe 972 tmp7099948.exe 1776 notpad.exe 1956 tmp7100260.exe 988 tmp7100401.exe 2044 notpad.exe 1584 tmp7100728.exe 1120 tmp7101212.exe 280 tmp7101789.exe 648 notpad.exe 1604 tmp7102054.exe 964 notpad.exe 1748 tmp7102553.exe 1408 tmp7102304.exe 1736 notpad.exe 1536 tmp7103224.exe 1796 notpad.exe 1640 tmp7103271.exe 1364 tmp7102959.exe 860 tmp7103411.exe 1992 notpad.exe 1568 tmp7104051.exe 1744 tmp7103692.exe 768 tmp7104129.exe 1560 notpad.exe 1716 tmp7104784.exe 1912 tmp7104909.exe 1380 notpad.exe 1636 tmp7105361.exe 1000 tmp7105658.exe 1988 notpad.exe 676 tmp7105970.exe 1648 tmp7106173.exe 1936 notpad.exe 856 tmp7106750.exe 972 tmp7106968.exe 1068 notpad.exe 988 tmp7107530.exe 1776 tmp7107717.exe 1172 notpad.exe 1120 tmp7108653.exe 280 tmp7108871.exe 1116 notpad.exe 2036 tmp7109511.exe 1604 tmp7109745.exe 1468 notpad.exe 2004 tmp7110431.exe 1048 tmp7110743.exe 1536 notpad.exe -
resource yara_rule behavioral1/files/0x000b0000000122cc-58.dat upx behavioral1/files/0x000b0000000122cc-61.dat upx behavioral1/files/0x000b0000000122cc-59.dat upx behavioral1/files/0x000b0000000122cc-62.dat upx behavioral1/files/0x00080000000122e4-69.dat upx behavioral1/files/0x00080000000122e4-72.dat upx behavioral1/files/0x00080000000122e4-70.dat upx behavioral1/files/0x00080000000122e4-74.dat upx behavioral1/memory/1748-73-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1584-75-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1116-85-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001230f-90.dat upx behavioral1/files/0x000900000001230f-91.dat upx behavioral1/files/0x000900000001230f-93.dat upx behavioral1/files/0x000900000001230f-94.dat upx behavioral1/files/0x00080000000122f9-101.dat upx behavioral1/files/0x000900000001230f-104.dat upx behavioral1/memory/1680-108-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001230f-109.dat upx behavioral1/files/0x000900000001230f-112.dat upx behavioral1/memory/1292-113-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000122f9-121.dat upx behavioral1/files/0x000900000001230f-125.dat upx behavioral1/files/0x000900000001230f-124.dat upx behavioral1/memory/1292-132-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001230f-129.dat upx behavioral1/files/0x00080000000122f9-138.dat upx behavioral1/files/0x000900000001230f-141.dat upx behavioral1/files/0x000900000001230f-142.dat upx behavioral1/files/0x000900000001230f-144.dat upx behavioral1/memory/2012-150-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000122f9-156.dat upx behavioral1/memory/1132-161-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1776-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1132-163-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1776-168-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2044-174-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/964-181-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/648-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/648-184-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1736-191-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/964-193-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1796-202-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1992-204-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1992-205-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1560-212-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1380-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1988-222-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1988-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1936-231-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1068-237-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1172-242-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1116-249-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1468-255-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1536-258-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1536-260-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1876-263-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1992-267-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1216-270-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/428-271-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/428-274-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1528-277-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1580-279-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1936-283-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 64 IoCs
pid Process 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 1748 tmp7096329.exe 1748 tmp7096329.exe 1748 tmp7096329.exe 1748 tmp7096329.exe 1116 tmp7096625.exe 1116 tmp7096625.exe 1116 tmp7096625.exe 1116 tmp7096625.exe 1204 tmp7096735.exe 1204 tmp7096735.exe 1680 notpad.exe 1680 notpad.exe 1740 tmp7098622.exe 1680 notpad.exe 1740 tmp7098622.exe 1292 notpad.exe 1292 notpad.exe 1816 WerFault.exe 1816 WerFault.exe 468 tmp7098919.exe 468 tmp7098919.exe 1292 notpad.exe 2012 notpad.exe 2012 notpad.exe 1528 tmp7099371.exe 1528 tmp7099371.exe 2012 notpad.exe 1132 notpad.exe 1132 notpad.exe 972 tmp7099948.exe 972 tmp7099948.exe 1132 notpad.exe 1776 notpad.exe 1776 notpad.exe 988 tmp7100401.exe 988 tmp7100401.exe 1776 notpad.exe 2044 notpad.exe 2044 notpad.exe 1120 tmp7101212.exe 1120 tmp7101212.exe 2044 notpad.exe 648 notpad.exe 648 notpad.exe 1604 tmp7102054.exe 1604 tmp7102054.exe 648 notpad.exe 964 notpad.exe 964 notpad.exe 1748 tmp7102553.exe 1748 tmp7102553.exe 1736 notpad.exe 1736 notpad.exe 1536 tmp7103224.exe 1536 tmp7103224.exe 1736 notpad.exe 964 notpad.exe 1796 notpad.exe 1796 notpad.exe 860 tmp7103411.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp7135875.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7141491.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7175562.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7103224.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7101212.exe File created C:\Windows\SysWOW64\notpad.exe tmp7121632.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7131460.exe File created C:\Windows\SysWOW64\notpad.exe tmp7135236.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7136468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7151787.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7232861.exe File created C:\Windows\SysWOW64\notpad.exe tmp7098622.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7117873.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7123489.exe File created C:\Windows\SysWOW64\notpad.exe tmp7131460.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7230583.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7098622.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7099948.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7135236.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7161569.exe File created C:\Windows\SysWOW64\notpad.exe tmp7175562.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7098919.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7136796.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7175562.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7175562.exe File created C:\Windows\SysWOW64\notpad.exe tmp7194641.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7227682.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7129635.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7143176.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7172785.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7222955.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7225560.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7133364.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7103224.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7104784.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7106750.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7162317.exe File created C:\Windows\SysWOW64\notpad.exe tmp7169415.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7232861.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7102054.exe File created C:\Windows\SysWOW64\notpad.exe tmp7108653.exe File created C:\Windows\SysWOW64\notpad.exe tmp7117873.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7128980.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7131460.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7184298.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7216590.exe File created C:\Windows\SysWOW64\notpad.exe tmp7237993.exe File created C:\Windows\SysWOW64\fsb.stb tmp7096735.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7105970.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7109511.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7114253.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7117186.exe File created C:\Windows\SysWOW64\notpad.exe tmp7141491.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7143816.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7184626.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7102553.exe File created C:\Windows\SysWOW64\notpad.exe tmp7232861.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7127592.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7135875.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7237993.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7103411.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7103411.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7112350.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7126827.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1816 2040 WerFault.exe 31 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7102054.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7103224.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7118622.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7169415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7098919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7099948.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7115361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7129635.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7130197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7099371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7104051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7117186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7124238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7132755.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7133364.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7121632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7141491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7150399.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7162317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7175172.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7181038.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7123489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7126827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7128278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7140274.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7186810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7230583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7114721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7136796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7172785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7100401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7127592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7143816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7167450.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7189867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7106750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7126094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7130836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7134066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7137420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7194641.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7101212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7110431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7117873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7122194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7131460.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7135236.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7151787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7184298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7104784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7108653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7143176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7184626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7114253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7134643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7179103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7222955.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7225560.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7227682.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7232861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7096735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7103411.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7105361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7109511.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1172 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 26 PID 1584 wrote to memory of 1172 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 26 PID 1584 wrote to memory of 1172 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 26 PID 1584 wrote to memory of 1172 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 26 PID 1584 wrote to memory of 1748 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 27 PID 1584 wrote to memory of 1748 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 27 PID 1584 wrote to memory of 1748 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 27 PID 1584 wrote to memory of 1748 1584 c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe 27 PID 1748 wrote to memory of 1408 1748 tmp7096329.exe 28 PID 1748 wrote to memory of 1408 1748 tmp7096329.exe 28 PID 1748 wrote to memory of 1408 1748 tmp7096329.exe 28 PID 1748 wrote to memory of 1408 1748 tmp7096329.exe 28 PID 1748 wrote to memory of 1116 1748 tmp7096329.exe 29 PID 1748 wrote to memory of 1116 1748 tmp7096329.exe 29 PID 1748 wrote to memory of 1116 1748 tmp7096329.exe 29 PID 1748 wrote to memory of 1116 1748 tmp7096329.exe 29 PID 1116 wrote to memory of 1204 1116 tmp7096625.exe 30 PID 1116 wrote to memory of 1204 1116 tmp7096625.exe 30 PID 1116 wrote to memory of 1204 1116 tmp7096625.exe 30 PID 1116 wrote to memory of 1204 1116 tmp7096625.exe 30 PID 1116 wrote to memory of 2040 1116 tmp7096625.exe 31 PID 1116 wrote to memory of 2040 1116 tmp7096625.exe 31 PID 1116 wrote to memory of 2040 1116 tmp7096625.exe 31 PID 1116 wrote to memory of 2040 1116 tmp7096625.exe 31 PID 1204 wrote to memory of 1680 1204 tmp7096735.exe 33 PID 1204 wrote to memory of 1680 1204 tmp7096735.exe 33 PID 1204 wrote to memory of 1680 1204 tmp7096735.exe 33 PID 1204 wrote to memory of 1680 1204 tmp7096735.exe 33 PID 2040 wrote to memory of 1816 2040 tmp7096859.exe 32 PID 2040 wrote to memory of 1816 2040 tmp7096859.exe 32 PID 2040 wrote to memory of 1816 2040 tmp7096859.exe 32 PID 2040 wrote to memory of 1816 2040 tmp7096859.exe 32 PID 1680 wrote to memory of 1740 1680 notpad.exe 34 PID 1680 wrote to memory of 1740 1680 notpad.exe 34 PID 1680 wrote to memory of 1740 1680 notpad.exe 34 PID 1680 wrote to memory of 1740 1680 notpad.exe 34 PID 1680 wrote to memory of 1052 1680 notpad.exe 36 PID 1680 wrote to memory of 1052 1680 notpad.exe 36 PID 1680 wrote to memory of 1052 1680 notpad.exe 36 PID 1680 wrote to memory of 1052 1680 notpad.exe 36 PID 1740 wrote to memory of 1292 1740 tmp7098622.exe 35 PID 1740 wrote to memory of 1292 1740 tmp7098622.exe 35 PID 1740 wrote to memory of 1292 1740 tmp7098622.exe 35 PID 1740 wrote to memory of 1292 1740 tmp7098622.exe 35 PID 1292 wrote to memory of 468 1292 notpad.exe 37 PID 1292 wrote to memory of 468 1292 notpad.exe 37 PID 1292 wrote to memory of 468 1292 notpad.exe 37 PID 1292 wrote to memory of 468 1292 notpad.exe 37 PID 468 wrote to memory of 2012 468 tmp7098919.exe 39 PID 468 wrote to memory of 2012 468 tmp7098919.exe 39 PID 468 wrote to memory of 2012 468 tmp7098919.exe 39 PID 468 wrote to memory of 2012 468 tmp7098919.exe 39 PID 1292 wrote to memory of 820 1292 notpad.exe 38 PID 1292 wrote to memory of 820 1292 notpad.exe 38 PID 1292 wrote to memory of 820 1292 notpad.exe 38 PID 1292 wrote to memory of 820 1292 notpad.exe 38 PID 2012 wrote to memory of 1528 2012 notpad.exe 40 PID 2012 wrote to memory of 1528 2012 notpad.exe 40 PID 2012 wrote to memory of 1528 2012 notpad.exe 40 PID 2012 wrote to memory of 1528 2012 notpad.exe 40 PID 1528 wrote to memory of 1132 1528 tmp7099371.exe 41 PID 1528 wrote to memory of 1132 1528 tmp7099371.exe 41 PID 1528 wrote to memory of 1132 1528 tmp7099371.exe 41 PID 1528 wrote to memory of 1132 1528 tmp7099371.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe"C:\Users\Admin\AppData\Local\Temp\c4e4812487c4503e2546e72343067700fdd338791e162450f66013facecd118f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\tmp7096220.exeC:\Users\Admin\AppData\Local\Temp\tmp7096220.exe2⤵
- Executes dropped EXE
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7096329.exeC:\Users\Admin\AppData\Local\Temp\tmp7096329.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\tmp7096469.exeC:\Users\Admin\AppData\Local\Temp\tmp7096469.exe3⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7096625.exeC:\Users\Admin\AppData\Local\Temp\tmp7096625.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\tmp7096735.exeC:\Users\Admin\AppData\Local\Temp\tmp7096735.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\tmp7098622.exeC:\Users\Admin\AppData\Local\Temp\tmp7098622.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\tmp7098919.exeC:\Users\Admin\AppData\Local\Temp\tmp7098919.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\tmp7099371.exeC:\Users\Admin\AppData\Local\Temp\tmp7099371.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\tmp7099948.exeC:\Users\Admin\AppData\Local\Temp\tmp7099948.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\tmp7100401.exeC:\Users\Admin\AppData\Local\Temp\tmp7100401.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\tmp7101212.exeC:\Users\Admin\AppData\Local\Temp\tmp7101212.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:648 -
C:\Users\Admin\AppData\Local\Temp\tmp7102054.exeC:\Users\Admin\AppData\Local\Temp\tmp7102054.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1604 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:964 -
C:\Users\Admin\AppData\Local\Temp\tmp7102553.exeC:\Users\Admin\AppData\Local\Temp\tmp7102553.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\tmp7103224.exeC:\Users\Admin\AppData\Local\Temp\tmp7103224.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\tmp7103411.exeC:\Users\Admin\AppData\Local\Temp\tmp7103411.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:860 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\tmp7104051.exeC:\Users\Admin\AppData\Local\Temp\tmp7104051.exe26⤵
- Executes dropped EXE
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\tmp7104784.exeC:\Users\Admin\AppData\Local\Temp\tmp7104784.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\tmp7105361.exeC:\Users\Admin\AppData\Local\Temp\tmp7105361.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\tmp7105970.exeC:\Users\Admin\AppData\Local\Temp\tmp7105970.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\tmp7106750.exeC:\Users\Admin\AppData\Local\Temp\tmp7106750.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\tmp7107530.exeC:\Users\Admin\AppData\Local\Temp\tmp7107530.exe36⤵
- Executes dropped EXE
PID:988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\tmp7108653.exeC:\Users\Admin\AppData\Local\Temp\tmp7108653.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\tmp7109511.exeC:\Users\Admin\AppData\Local\Temp\tmp7109511.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\tmp7110431.exeC:\Users\Admin\AppData\Local\Temp\tmp7110431.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:2004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵
- Executes dropped EXE
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\tmp7112350.exeC:\Users\Admin\AppData\Local\Temp\tmp7112350.exe44⤵
- Drops file in System32 directory
PID:1472 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\tmp7113286.exeC:\Users\Admin\AppData\Local\Temp\tmp7113286.exe46⤵PID:1976
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\tmp7114253.exeC:\Users\Admin\AppData\Local\Temp\tmp7114253.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\tmp7114721.exeC:\Users\Admin\AppData\Local\Temp\tmp7114721.exe50⤵
- Modifies registry class
PID:1496 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\tmp7115361.exeC:\Users\Admin\AppData\Local\Temp\tmp7115361.exe52⤵
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\tmp7116609.exeC:\Users\Admin\AppData\Local\Temp\tmp7116609.exe54⤵PID:1080
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\tmp7117186.exeC:\Users\Admin\AppData\Local\Temp\tmp7117186.exe56⤵
- Drops file in System32 directory
- Modifies registry class
PID:1308 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp7117873.exeC:\Users\Admin\AppData\Local\Temp\tmp7117873.exe58⤵
- Drops file in System32 directory
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\tmp7118622.exeC:\Users\Admin\AppData\Local\Temp\tmp7118622.exe60⤵
- Modifies registry class
PID:1584 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\tmp7119230.exeC:\Users\Admin\AppData\Local\Temp\tmp7119230.exe62⤵PID:2044
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\tmp7119932.exeC:\Users\Admin\AppData\Local\Temp\tmp7119932.exe64⤵PID:904
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\tmp7120696.exeC:\Users\Admin\AppData\Local\Temp\tmp7120696.exe66⤵PID:1960
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\tmp7121632.exeC:\Users\Admin\AppData\Local\Temp\tmp7121632.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\tmp7122194.exeC:\Users\Admin\AppData\Local\Temp\tmp7122194.exe70⤵
- Modifies registry class
PID:2000 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\tmp7123489.exeC:\Users\Admin\AppData\Local\Temp\tmp7123489.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:1364 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\tmp7124238.exeC:\Users\Admin\AppData\Local\Temp\tmp7124238.exe74⤵
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\tmp7124830.exeC:\Users\Admin\AppData\Local\Temp\tmp7124830.exe76⤵PID:360
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\tmp7125517.exeC:\Users\Admin\AppData\Local\Temp\tmp7125517.exe78⤵PID:1560
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\tmp7126094.exeC:\Users\Admin\AppData\Local\Temp\tmp7126094.exe80⤵
- Modifies registry class
PID:1056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\tmp7126827.exeC:\Users\Admin\AppData\Local\Temp\tmp7126827.exe82⤵
- Drops file in System32 directory
- Modifies registry class
PID:676 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\tmp7127592.exeC:\Users\Admin\AppData\Local\Temp\tmp7127592.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:1464 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\tmp7128278.exeC:\Users\Admin\AppData\Local\Temp\tmp7128278.exe86⤵
- Modifies registry class
PID:1132 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\tmp7128980.exeC:\Users\Admin\AppData\Local\Temp\tmp7128980.exe88⤵
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\tmp7129635.exeC:\Users\Admin\AppData\Local\Temp\tmp7129635.exe90⤵
- Drops file in System32 directory
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\tmp7130197.exeC:\Users\Admin\AppData\Local\Temp\tmp7130197.exe92⤵
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\tmp7130836.exeC:\Users\Admin\AppData\Local\Temp\tmp7130836.exe94⤵
- Modifies registry class
PID:1740 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\tmp7131460.exeC:\Users\Admin\AppData\Local\Temp\tmp7131460.exe96⤵
- Drops file in System32 directory
- Modifies registry class
PID:1352 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\tmp7132147.exeC:\Users\Admin\AppData\Local\Temp\tmp7132147.exe98⤵PID:612
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\tmp7132755.exeC:\Users\Admin\AppData\Local\Temp\tmp7132755.exe100⤵
- Modifies registry class
PID:656 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\tmp7133364.exeC:\Users\Admin\AppData\Local\Temp\tmp7133364.exe102⤵
- Drops file in System32 directory
- Modifies registry class
PID:1980 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\tmp7134066.exeC:\Users\Admin\AppData\Local\Temp\tmp7134066.exe104⤵
- Modifies registry class
PID:692 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\tmp7134643.exeC:\Users\Admin\AppData\Local\Temp\tmp7134643.exe106⤵
- Modifies registry class
PID:1860 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\tmp7135345.exeC:\Users\Admin\AppData\Local\Temp\tmp7135345.exe108⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7135516.exeC:\Users\Admin\AppData\Local\Temp\tmp7135516.exe108⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\tmp7135875.exeC:\Users\Admin\AppData\Local\Temp\tmp7135875.exe109⤵
- Drops file in System32 directory
PID:900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"110⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\tmp7136796.exeC:\Users\Admin\AppData\Local\Temp\tmp7136796.exe111⤵
- Drops file in System32 directory
- Modifies registry class
PID:648 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\tmp7137841.exeC:\Users\Admin\AppData\Local\Temp\tmp7137841.exe113⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7139557.exeC:\Users\Admin\AppData\Local\Temp\tmp7139557.exe113⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\tmp7140415.exeC:\Users\Admin\AppData\Local\Temp\tmp7140415.exe114⤵PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7141210.exeC:\Users\Admin\AppData\Local\Temp\tmp7141210.exe114⤵PID:1664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7137092.exeC:\Users\Admin\AppData\Local\Temp\tmp7137092.exe111⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\tmp7137420.exeC:\Users\Admin\AppData\Local\Temp\tmp7137420.exe112⤵
- Modifies registry class
PID:996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\tmp7140274.exeC:\Users\Admin\AppData\Local\Temp\tmp7140274.exe114⤵
- Modifies registry class
PID:1964 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\tmp7141772.exeC:\Users\Admin\AppData\Local\Temp\tmp7141772.exe116⤵PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7142396.exeC:\Users\Admin\AppData\Local\Temp\tmp7142396.exe116⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\tmp7143550.exeC:\Users\Admin\AppData\Local\Temp\tmp7143550.exe117⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7143644.exeC:\Users\Admin\AppData\Local\Temp\tmp7143644.exe117⤵PID:1060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7141023.exeC:\Users\Admin\AppData\Local\Temp\tmp7141023.exe114⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\tmp7141491.exeC:\Users\Admin\AppData\Local\Temp\tmp7141491.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:768 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\tmp7143176.exeC:\Users\Admin\AppData\Local\Temp\tmp7143176.exe117⤵
- Drops file in System32 directory
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\tmp7144830.exeC:\Users\Admin\AppData\Local\Temp\tmp7144830.exe119⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7145017.exeC:\Users\Admin\AppData\Local\Temp\tmp7145017.exe119⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\tmp7145688.exeC:\Users\Admin\AppData\Local\Temp\tmp7145688.exe120⤵PID:1200
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp7146858.exeC:\Users\Admin\AppData\Local\Temp\tmp7146858.exe122⤵PID:2044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-