Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
2eb6c04c9c64b6e1f3bff890b93808c450f489e936bdfa2dde8ebb4ff229eee9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2eb6c04c9c64b6e1f3bff890b93808c450f489e936bdfa2dde8ebb4ff229eee9.dll
Resource
win10v2004-20221111-en
General
-
Target
2eb6c04c9c64b6e1f3bff890b93808c450f489e936bdfa2dde8ebb4ff229eee9.dll
-
Size
3.6MB
-
MD5
54532d90ba9844ab2e34d4f37b3c3bd9
-
SHA1
21f7644b0816117149afa02cb2973ff28906e09a
-
SHA256
2eb6c04c9c64b6e1f3bff890b93808c450f489e936bdfa2dde8ebb4ff229eee9
-
SHA512
85085e9bf144fbe0d7e152b7af62a698c54d2ba1868607fedb43bb208361464802a1be0172a97f0f13bbd074e0ec30be786565145bdf612185bf70a8a6c18953
-
SSDEEP
24576:fOM3Wrf85NUD6rkvjsUpqc2/NJzHjUUIGFDPob6nDY7cKunNaun/hBqSGcvzXlJa:fH1Vcujau/h4SGcrQmOrh97TUTRalb
Malware Config
Signatures
-
ParallaxRat payload 2 IoCs
Detects payload of Parallax Rat, a small portable Rat usually digitally signed with a Sectigo certificate.
resource yara_rule behavioral1/memory/1260-61-0x0000000016B60000-0x0000000017132000-memory.dmp parallax_rat behavioral1/memory/1260-67-0x0000000016B67000-0x0000000016B77000-memory.dmp parallax_rat -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 rundll32.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe 1260 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1688 wrote to memory of 1044 1688 rundll32.exe 27 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1044 wrote to memory of 1260 1044 rundll32.exe 28 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 1088 1260 notepad.exe 30 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31 PID 1260 wrote to memory of 584 1260 notepad.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2eb6c04c9c64b6e1f3bff890b93808c450f489e936bdfa2dde8ebb4ff229eee9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2eb6c04c9c64b6e1f3bff890b93808c450f489e936bdfa2dde8ebb4ff229eee9.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:1328
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:836
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1812
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1696
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1060
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:332
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1320
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1324
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1964
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1808
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:608
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:556
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1000
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:756
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1032
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1620
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1720
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1436
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1532
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1272
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1660
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1220
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1316
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1704
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2012
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:580
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1204
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1512
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1160
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1396
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1636
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:956
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1768
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:900
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:624
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1308
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1480
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:772
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1376
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1956
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:932
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1592
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1612
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1788
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1680
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1764
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1052
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2040
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1992
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1980
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1616
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1996
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1208
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1148
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1428
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1348
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:908
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1384
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:1380
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2056
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2068
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2080
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2092
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2104
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2116
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2128
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2140
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2152
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2164
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2176
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2188
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2200
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2212
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2224
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2236
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2248
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2260
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2272
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2284
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2296
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2308
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2320
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2332
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2344
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2356
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2368
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2380
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2392
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2404
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2416
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2428
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2440
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2452
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2464
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2476
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2488
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2500
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2512
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2524
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2536
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2548
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2560
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2572
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2584
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2596
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2608
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2620
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2632
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2644
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2656
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2668
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2680
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2692
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2704
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2716
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2728
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2740
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2752
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2764
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2776
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2788
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2800
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2812
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2824
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2836
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2848
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2860
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2872
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"4⤵PID:2884
-
-
-