Analysis
-
max time kernel
156s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 20:52
Behavioral task
behavioral1
Sample
dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe
Resource
win10v2004-20220812-en
General
-
Target
dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe
-
Size
9.6MB
-
MD5
baee066a147e3e7cc605f525c1b3b917
-
SHA1
0a7b1193fb18a9bb20632537f77c1aacf961ee0a
-
SHA256
dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a
-
SHA512
7d77fc0f8dc5b90ed7c2d0c10aeaa0e715918bd191ed7507a1f0c5bf57ed05503b06114ea86d7aa1a8971c559ad41498aed042be2086ef809ab220adb0777561
-
SSDEEP
24576:aDyTFtj+DyTFtjFDyTFtjBDyTFtjTDyTFtjzDyTFtj:HtntWtatYtYt
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 576 tmp7102553.exe 2000 tmp7104020.exe 864 tmp7106063.exe 1604 tmp7106313.exe 1560 tmp7108247.exe 1528 tmp7108684.exe 588 tmp7112132.exe 1584 tmp7113458.exe 692 tmp7113879.exe 604 tmp7114768.exe 1924 tmp7115314.exe 1696 tmp7115767.exe 1320 notpad.exe 824 tmp7119870.exe 832 tmp7120306.exe 1164 notpad.exe 900 tmp7121320.exe 1176 notpad.exe 1352 tmp7121757.exe 1708 tmp7122210.exe 1684 notpad.exe 1500 tmp7122631.exe 988 tmp7123333.exe 1548 notpad.exe 1792 tmp7124456.exe 1704 tmp7124752.exe 1944 notpad.exe 588 tmp7126406.exe 1284 tmp7126952.exe 692 notpad.exe 956 tmp7128309.exe 976 tmp7128980.exe 1960 notpad.exe 772 tmp7129651.exe 1756 tmp7129791.exe 1972 tmp7130696.exe 1476 notpad.exe 924 tmp7130992.exe 1328 tmp7132474.exe 564 notpad.exe 1552 tmp7134690.exe 1824 tmp7136577.exe 1640 notpad.exe 1492 tmp7137326.exe 788 tmp7138480.exe 1692 notpad.exe 2012 tmp7139026.exe 1748 notpad.exe 1504 tmp7139588.exe 1176 tmp7139838.exe 308 notpad.exe 1088 tmp7140633.exe 988 tmp7140820.exe 1744 tmp7141647.exe 1896 notpad.exe 524 tmp7141944.exe 584 notpad.exe 1296 tmp7143660.exe 1488 tmp7144720.exe 1944 notpad.exe 2004 tmp7146577.exe 1808 tmp7146889.exe 1508 tmp7148324.exe 1732 notpad.exe -
resource yara_rule behavioral1/memory/1672-54-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000005c50-60.dat upx behavioral1/files/0x0007000000005c50-63.dat upx behavioral1/files/0x0007000000005c50-65.dat upx behavioral1/memory/1672-64-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0007000000005c50-61.dat upx behavioral1/memory/2000-71-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000012301-72.dat upx behavioral1/files/0x0008000000012301-77.dat upx behavioral1/memory/2000-76-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000012301-75.dat upx behavioral1/files/0x0008000000012301-73.dat upx behavioral1/memory/1604-83-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000012353-85.dat upx behavioral1/files/0x0008000000012353-86.dat upx behavioral1/files/0x0008000000012353-88.dat upx behavioral1/files/0x0008000000012353-89.dat upx behavioral1/memory/1604-90-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1528-91-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000012732-100.dat upx behavioral1/files/0x0008000000012732-101.dat upx behavioral1/files/0x0008000000012732-98.dat upx behavioral1/files/0x0008000000012732-97.dat upx behavioral1/memory/1528-102-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1584-103-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000126d3-109.dat upx behavioral1/files/0x00070000000132c1-111.dat upx behavioral1/files/0x00070000000132c1-113.dat upx behavioral1/files/0x00070000000132c1-115.dat upx behavioral1/memory/1584-114-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00070000000132c1-110.dat upx behavioral1/memory/864-121-0x0000000001D00000-0x0000000001D1F000-memory.dmp upx behavioral1/memory/604-122-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/604-127-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000126d3-132.dat upx behavioral1/files/0x00080000000126d3-131.dat upx behavioral1/files/0x00080000000126d3-129.dat upx behavioral1/files/0x000700000001268a-139.dat upx behavioral1/memory/1320-145-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000126d3-146.dat upx behavioral1/files/0x00080000000126d3-149.dat upx behavioral1/memory/1164-151-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000126d3-147.dat upx behavioral1/files/0x000700000001268a-157.dat upx behavioral1/files/0x00080000000126d3-160.dat upx behavioral1/memory/1164-163-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1176-167-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1176-170-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1684-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1548-176-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1684-179-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1548-184-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1944-187-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1944-192-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/692-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1960-199-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1960-204-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1476-206-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1476-211-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/564-213-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/564-218-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1640-222-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1640-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1692-232-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 64 IoCs
pid Process 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 2000 tmp7104020.exe 2000 tmp7104020.exe 2000 tmp7104020.exe 2000 tmp7104020.exe 1604 tmp7106313.exe 1604 tmp7106313.exe 1604 tmp7106313.exe 1604 tmp7106313.exe 1528 tmp7108684.exe 1528 tmp7108684.exe 1528 tmp7108684.exe 1528 tmp7108684.exe 1584 tmp7113458.exe 1584 tmp7113458.exe 864 tmp7106063.exe 1584 tmp7113458.exe 1584 tmp7113458.exe 604 tmp7114768.exe 604 tmp7114768.exe 604 tmp7114768.exe 604 tmp7114768.exe 864 tmp7106063.exe 1320 notpad.exe 1320 notpad.exe 1320 notpad.exe 824 tmp7119870.exe 824 tmp7119870.exe 1164 notpad.exe 1164 notpad.exe 900 tmp7121320.exe 900 tmp7121320.exe 1164 notpad.exe 1212 WerFault.exe 1212 WerFault.exe 1176 notpad.exe 1176 notpad.exe 1708 tmp7122210.exe 1708 tmp7122210.exe 1176 notpad.exe 1684 notpad.exe 1684 notpad.exe 988 tmp7123333.exe 988 tmp7123333.exe 1684 notpad.exe 1548 notpad.exe 1548 notpad.exe 1704 tmp7124752.exe 1704 tmp7124752.exe 1548 notpad.exe 1944 notpad.exe 1944 notpad.exe 1284 tmp7126952.exe 1284 tmp7126952.exe 1944 notpad.exe 692 notpad.exe 692 notpad.exe 976 tmp7128980.exe 976 tmp7128980.exe 692 notpad.exe 1960 notpad.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\notpad.exe tmp7178230.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7183424.exe File created C:\Windows\SysWOW64\notpad.exe tmp7208182.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7139026.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7150867.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7157232.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7176857.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7232533.exe File created C:\Windows\SysWOW64\fsb.tmp tmp7106063.exe File created C:\Windows\SysWOW64\notpad.exe tmp7124752.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7150867.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7186856.exe File created C:\Windows\SysWOW64\notpad.exe tmp7183861.exe File created C:\Windows\SysWOW64\notpad.exe tmp7205654.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7212955.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7139026.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7154892.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7175281.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7180148.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7152911.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7190117.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7200631.exe File created C:\Windows\SysWOW64\notpad.exe tmp7162505.exe File created C:\Windows\SysWOW64\notpad.exe tmp7165281.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7180351.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7228509.exe File created C:\Windows\SysWOW64\notpad.exe tmp7243001.exe File created C:\Windows\SysWOW64\notpad.exe tmp7182223.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7198057.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7185484.exe File created C:\Windows\SysWOW64\notpad.exe tmp7166670.exe File created C:\Windows\SysWOW64\notpad.exe tmp7233922.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7237354.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7141944.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7164361.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7226683.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7240068.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7126952.exe File created C:\Windows\SysWOW64\notpad.exe tmp7159775.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7237401.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7173003.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7220755.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7223158.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7166670.exe File created C:\Windows\SysWOW64\notpad.exe tmp7168167.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7205654.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7232533.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7139838.exe File created C:\Windows\SysWOW64\notpad.exe tmp7176857.exe File created C:\Windows\SysWOW64\notpad.exe tmp7191412.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7211442.exe File created C:\Windows\SysWOW64\notpad.exe tmp7195202.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7223158.exe File created C:\Windows\SysWOW64\notpad.exe tmp7123333.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7128980.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7175359.exe File created C:\Windows\SysWOW64\notpad.exe notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7175577.exe File created C:\Windows\SysWOW64\notpad.exe tmp7180148.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7182020.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7183861.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7106063.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7139838.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1212 1696 WerFault.exe 39 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7220880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7148543.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7157029.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7184095.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7188167.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7205654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7121320.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7150867.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7163862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7183861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7190117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7232533.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7233922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7106063.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7123333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7159775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7176857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7182020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7195202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7234983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7130992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7163565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7164361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7165313.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7178230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7217698.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7237401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7119870.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7129791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7139026.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7151725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7161491.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7216918.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7235856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7156077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7180351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7183424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7204344.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7216278.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7228509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7134690.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7173003.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7184314.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7209336.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7211442.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7212955.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7223158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7225045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7139838.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7140820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7146889.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7172785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7175359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7226683.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7243001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7241207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7128980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7180148.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7182223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7207792.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7240068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7175281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7224234.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 576 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 27 PID 1672 wrote to memory of 576 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 27 PID 1672 wrote to memory of 576 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 27 PID 1672 wrote to memory of 576 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 27 PID 1672 wrote to memory of 2000 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 28 PID 1672 wrote to memory of 2000 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 28 PID 1672 wrote to memory of 2000 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 28 PID 1672 wrote to memory of 2000 1672 dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe 28 PID 2000 wrote to memory of 864 2000 tmp7104020.exe 29 PID 2000 wrote to memory of 864 2000 tmp7104020.exe 29 PID 2000 wrote to memory of 864 2000 tmp7104020.exe 29 PID 2000 wrote to memory of 864 2000 tmp7104020.exe 29 PID 2000 wrote to memory of 1604 2000 tmp7104020.exe 30 PID 2000 wrote to memory of 1604 2000 tmp7104020.exe 30 PID 2000 wrote to memory of 1604 2000 tmp7104020.exe 30 PID 2000 wrote to memory of 1604 2000 tmp7104020.exe 30 PID 1604 wrote to memory of 1560 1604 tmp7106313.exe 31 PID 1604 wrote to memory of 1560 1604 tmp7106313.exe 31 PID 1604 wrote to memory of 1560 1604 tmp7106313.exe 31 PID 1604 wrote to memory of 1560 1604 tmp7106313.exe 31 PID 1604 wrote to memory of 1528 1604 tmp7106313.exe 32 PID 1604 wrote to memory of 1528 1604 tmp7106313.exe 32 PID 1604 wrote to memory of 1528 1604 tmp7106313.exe 32 PID 1604 wrote to memory of 1528 1604 tmp7106313.exe 32 PID 1528 wrote to memory of 588 1528 tmp7108684.exe 33 PID 1528 wrote to memory of 588 1528 tmp7108684.exe 33 PID 1528 wrote to memory of 588 1528 tmp7108684.exe 33 PID 1528 wrote to memory of 588 1528 tmp7108684.exe 33 PID 1528 wrote to memory of 1584 1528 tmp7108684.exe 34 PID 1528 wrote to memory of 1584 1528 tmp7108684.exe 34 PID 1528 wrote to memory of 1584 1528 tmp7108684.exe 34 PID 1528 wrote to memory of 1584 1528 tmp7108684.exe 34 PID 1584 wrote to memory of 692 1584 tmp7113458.exe 35 PID 1584 wrote to memory of 692 1584 tmp7113458.exe 35 PID 1584 wrote to memory of 692 1584 tmp7113458.exe 35 PID 1584 wrote to memory of 692 1584 tmp7113458.exe 35 PID 1584 wrote to memory of 604 1584 tmp7113458.exe 37 PID 1584 wrote to memory of 604 1584 tmp7113458.exe 37 PID 1584 wrote to memory of 604 1584 tmp7113458.exe 37 PID 1584 wrote to memory of 604 1584 tmp7113458.exe 37 PID 604 wrote to memory of 1924 604 tmp7114768.exe 38 PID 604 wrote to memory of 1924 604 tmp7114768.exe 38 PID 604 wrote to memory of 1924 604 tmp7114768.exe 38 PID 604 wrote to memory of 1924 604 tmp7114768.exe 38 PID 604 wrote to memory of 1696 604 tmp7114768.exe 39 PID 604 wrote to memory of 1696 604 tmp7114768.exe 39 PID 604 wrote to memory of 1696 604 tmp7114768.exe 39 PID 604 wrote to memory of 1696 604 tmp7114768.exe 39 PID 864 wrote to memory of 1320 864 tmp7106063.exe 36 PID 864 wrote to memory of 1320 864 tmp7106063.exe 36 PID 864 wrote to memory of 1320 864 tmp7106063.exe 36 PID 864 wrote to memory of 1320 864 tmp7106063.exe 36 PID 1696 wrote to memory of 1212 1696 tmp7115767.exe 40 PID 1696 wrote to memory of 1212 1696 tmp7115767.exe 40 PID 1696 wrote to memory of 1212 1696 tmp7115767.exe 40 PID 1696 wrote to memory of 1212 1696 tmp7115767.exe 40 PID 1320 wrote to memory of 824 1320 notpad.exe 41 PID 1320 wrote to memory of 824 1320 notpad.exe 41 PID 1320 wrote to memory of 824 1320 notpad.exe 41 PID 1320 wrote to memory of 824 1320 notpad.exe 41 PID 1320 wrote to memory of 832 1320 notpad.exe 42 PID 1320 wrote to memory of 832 1320 notpad.exe 42 PID 1320 wrote to memory of 832 1320 notpad.exe 42 PID 1320 wrote to memory of 832 1320 notpad.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe"C:\Users\Admin\AppData\Local\Temp\dd4e3afb2a2ea6800301fc6bc55869685221d81045aa697f9c89d29e60f5580a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\tmp7102553.exeC:\Users\Admin\AppData\Local\Temp\tmp7102553.exe2⤵
- Executes dropped EXE
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7104020.exeC:\Users\Admin\AppData\Local\Temp\tmp7104020.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\tmp7106063.exeC:\Users\Admin\AppData\Local\Temp\tmp7106063.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\tmp7119870.exeC:\Users\Admin\AppData\Local\Temp\tmp7119870.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:824 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\tmp7121320.exeC:\Users\Admin\AppData\Local\Temp\tmp7121320.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:900 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\tmp7122210.exeC:\Users\Admin\AppData\Local\Temp\tmp7122210.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\tmp7123333.exeC:\Users\Admin\AppData\Local\Temp\tmp7123333.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\tmp7124752.exeC:\Users\Admin\AppData\Local\Temp\tmp7124752.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\tmp7126952.exeC:\Users\Admin\AppData\Local\Temp\tmp7126952.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1284 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:692 -
C:\Users\Admin\AppData\Local\Temp\tmp7128980.exeC:\Users\Admin\AppData\Local\Temp\tmp7128980.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:976 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\tmp7129791.exeC:\Users\Admin\AppData\Local\Temp\tmp7129791.exe19⤵
- Executes dropped EXE
- Modifies registry class
PID:1756 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"20⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\tmp7130992.exeC:\Users\Admin\AppData\Local\Temp\tmp7130992.exe21⤵
- Executes dropped EXE
- Modifies registry class
PID:924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\tmp7134690.exeC:\Users\Admin\AppData\Local\Temp\tmp7134690.exe23⤵
- Executes dropped EXE
- Modifies registry class
PID:1552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\tmp7137326.exeC:\Users\Admin\AppData\Local\Temp\tmp7137326.exe25⤵
- Executes dropped EXE
PID:1492 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\tmp7139026.exeC:\Users\Admin\AppData\Local\Temp\tmp7139026.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2012 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"28⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\tmp7139838.exeC:\Users\Admin\AppData\Local\Temp\tmp7139838.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵
- Executes dropped EXE
PID:308 -
C:\Users\Admin\AppData\Local\Temp\tmp7140820.exeC:\Users\Admin\AppData\Local\Temp\tmp7140820.exe31⤵
- Executes dropped EXE
- Modifies registry class
PID:988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵
- Executes dropped EXE
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\tmp7141944.exeC:\Users\Admin\AppData\Local\Temp\tmp7141944.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:524 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵
- Executes dropped EXE
PID:584 -
C:\Users\Admin\AppData\Local\Temp\tmp7144720.exeC:\Users\Admin\AppData\Local\Temp\tmp7144720.exe35⤵
- Executes dropped EXE
PID:1488 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"36⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\tmp7146889.exeC:\Users\Admin\AppData\Local\Temp\tmp7146889.exe37⤵
- Executes dropped EXE
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"38⤵
- Executes dropped EXE
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\tmp7148543.exeC:\Users\Admin\AppData\Local\Temp\tmp7148543.exe39⤵
- Modifies registry class
PID:536 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"40⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\tmp7150867.exeC:\Users\Admin\AppData\Local\Temp\tmp7150867.exe41⤵
- Drops file in System32 directory
- Modifies registry class
PID:1128 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"42⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\tmp7151725.exeC:\Users\Admin\AppData\Local\Temp\tmp7151725.exe43⤵
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\tmp7152911.exeC:\Users\Admin\AppData\Local\Temp\tmp7152911.exe45⤵
- Drops file in System32 directory
PID:928 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\tmp7153503.exeC:\Users\Admin\AppData\Local\Temp\tmp7153503.exe47⤵PID:1640
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"48⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\tmp7154892.exeC:\Users\Admin\AppData\Local\Temp\tmp7154892.exe49⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"50⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\tmp7156077.exeC:\Users\Admin\AppData\Local\Temp\tmp7156077.exe51⤵
- Modifies registry class
PID:2044 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\tmp7157029.exeC:\Users\Admin\AppData\Local\Temp\tmp7157029.exe53⤵
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\tmp7157700.exeC:\Users\Admin\AppData\Local\Temp\tmp7157700.exe55⤵PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7157762.exeC:\Users\Admin\AppData\Local\Temp\tmp7157762.exe55⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\tmp7158355.exeC:\Users\Admin\AppData\Local\Temp\tmp7158355.exe56⤵PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7159494.exeC:\Users\Admin\AppData\Local\Temp\tmp7159494.exe56⤵PID:1228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7157450.exeC:\Users\Admin\AppData\Local\Temp\tmp7157450.exe53⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\tmp7157856.exeC:\Users\Admin\AppData\Local\Temp\tmp7157856.exe54⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7159572.exeC:\Users\Admin\AppData\Local\Temp\tmp7159572.exe54⤵PID:2004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7156467.exeC:\Users\Admin\AppData\Local\Temp\tmp7156467.exe51⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\tmp7157232.exeC:\Users\Admin\AppData\Local\Temp\tmp7157232.exe52⤵
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\tmp7158168.exeC:\Users\Admin\AppData\Local\Temp\tmp7158168.exe54⤵PID:800
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\tmp7159775.exeC:\Users\Admin\AppData\Local\Temp\tmp7159775.exe56⤵
- Drops file in System32 directory
- Modifies registry class
PID:1808 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\tmp7162505.exeC:\Users\Admin\AppData\Local\Temp\tmp7162505.exe58⤵
- Drops file in System32 directory
PID:1076 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\tmp7163222.exeC:\Users\Admin\AppData\Local\Temp\tmp7163222.exe60⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7163690.exeC:\Users\Admin\AppData\Local\Temp\tmp7163690.exe60⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\tmp7164657.exeC:\Users\Admin\AppData\Local\Temp\tmp7164657.exe61⤵PID:576
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\tmp7165297.exeC:\Users\Admin\AppData\Local\Temp\tmp7165297.exe63⤵PID:1940
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\tmp7166670.exeC:\Users\Admin\AppData\Local\Temp\tmp7166670.exe65⤵
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\tmp7168277.exeC:\Users\Admin\AppData\Local\Temp\tmp7168277.exe67⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7172083.exeC:\Users\Admin\AppData\Local\Temp\tmp7172083.exe67⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\tmp7173003.exeC:\Users\Admin\AppData\Local\Temp\tmp7173003.exe68⤵
- Drops file in System32 directory
- Modifies registry class
PID:1684 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\tmp7175359.exeC:\Users\Admin\AppData\Local\Temp\tmp7175359.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\tmp7175577.exeC:\Users\Admin\AppData\Local\Temp\tmp7175577.exe72⤵
- Drops file in System32 directory
PID:1104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\tmp7176857.exeC:\Users\Admin\AppData\Local\Temp\tmp7176857.exe74⤵
- Drops file in System32 directory
- Modifies registry class
PID:1688 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\tmp7177793.exeC:\Users\Admin\AppData\Local\Temp\tmp7177793.exe76⤵PID:1124
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\tmp7179883.exeC:\Users\Admin\AppData\Local\Temp\tmp7179883.exe78⤵PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7181974.exeC:\Users\Admin\AppData\Local\Temp\tmp7181974.exe78⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\tmp7183206.exeC:\Users\Admin\AppData\Local\Temp\tmp7183206.exe79⤵PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7182925.exeC:\Users\Admin\AppData\Local\Temp\tmp7182925.exe79⤵PID:1336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7179556.exeC:\Users\Admin\AppData\Local\Temp\tmp7179556.exe76⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\tmp7180367.exeC:\Users\Admin\AppData\Local\Temp\tmp7180367.exe77⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7182067.exeC:\Users\Admin\AppData\Local\Temp\tmp7182067.exe77⤵PID:1656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7177652.exeC:\Users\Admin\AppData\Local\Temp\tmp7177652.exe74⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\tmp7178230.exeC:\Users\Admin\AppData\Local\Temp\tmp7178230.exe75⤵
- Drops file in System32 directory
- Modifies registry class
PID:1824 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\tmp7180148.exeC:\Users\Admin\AppData\Local\Temp\tmp7180148.exe77⤵
- Drops file in System32 directory
- Modifies registry class
PID:952 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"78⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\tmp7180507.exeC:\Users\Admin\AppData\Local\Temp\tmp7180507.exe79⤵PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7182114.exeC:\Users\Admin\AppData\Local\Temp\tmp7182114.exe79⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\tmp7182566.exeC:\Users\Admin\AppData\Local\Temp\tmp7182566.exe80⤵PID:604
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7183144.exeC:\Users\Admin\AppData\Local\Temp\tmp7183144.exe80⤵PID:1164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7180336.exeC:\Users\Admin\AppData\Local\Temp\tmp7180336.exe77⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\tmp7182020.exeC:\Users\Admin\AppData\Local\Temp\tmp7182020.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:1372 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\tmp7182644.exeC:\Users\Admin\AppData\Local\Temp\tmp7182644.exe80⤵PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7183081.exeC:\Users\Admin\AppData\Local\Temp\tmp7183081.exe80⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\tmp7183861.exeC:\Users\Admin\AppData\Local\Temp\tmp7183861.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:1328 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\tmp7184314.exeC:\Users\Admin\AppData\Local\Temp\tmp7184314.exe83⤵
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\tmp7185125.exeC:\Users\Admin\AppData\Local\Temp\tmp7185125.exe85⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7185374.exeC:\Users\Admin\AppData\Local\Temp\tmp7185374.exe85⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\tmp7185998.exeC:\Users\Admin\AppData\Local\Temp\tmp7185998.exe86⤵PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7186482.exeC:\Users\Admin\AppData\Local\Temp\tmp7186482.exe86⤵PID:1560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7184938.exeC:\Users\Admin\AppData\Local\Temp\tmp7184938.exe83⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\tmp7185484.exeC:\Users\Admin\AppData\Local\Temp\tmp7185484.exe84⤵
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\tmp7198744.exeC:\Users\Admin\AppData\Local\Temp\tmp7198744.exe86⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7199368.exeC:\Users\Admin\AppData\Local\Temp\tmp7199368.exe86⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\tmp7200959.exeC:\Users\Admin\AppData\Local\Temp\tmp7200959.exe87⤵PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7201770.exeC:\Users\Admin\AppData\Local\Temp\tmp7201770.exe87⤵PID:1728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7186654.exeC:\Users\Admin\AppData\Local\Temp\tmp7186654.exe84⤵PID:2040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7184111.exeC:\Users\Admin\AppData\Local\Temp\tmp7184111.exe81⤵PID:332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7182301.exeC:\Users\Admin\AppData\Local\Temp\tmp7182301.exe78⤵PID:1828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7179930.exeC:\Users\Admin\AppData\Local\Temp\tmp7179930.exe75⤵PID:1620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7176623.exeC:\Users\Admin\AppData\Local\Temp\tmp7176623.exe72⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\tmp7177122.exeC:\Users\Admin\AppData\Local\Temp\tmp7177122.exe73⤵PID:824
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\tmp7177559.exeC:\Users\Admin\AppData\Local\Temp\tmp7177559.exe75⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7179790.exeC:\Users\Admin\AppData\Local\Temp\tmp7179790.exe75⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\tmp7180351.exeC:\Users\Admin\AppData\Local\Temp\tmp7180351.exe76⤵
- Drops file in System32 directory
- Modifies registry class
PID:1708 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\tmp7182223.exeC:\Users\Admin\AppData\Local\Temp\tmp7182223.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:760 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\tmp7183424.exeC:\Users\Admin\AppData\Local\Temp\tmp7183424.exe80⤵
- Drops file in System32 directory
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\tmp7184095.exeC:\Users\Admin\AppData\Local\Temp\tmp7184095.exe82⤵
- Modifies registry class
PID:1744 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\tmp7184750.exeC:\Users\Admin\AppData\Local\Temp\tmp7184750.exe84⤵PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7185203.exeC:\Users\Admin\AppData\Local\Temp\tmp7185203.exe84⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\tmp7186186.exeC:\Users\Admin\AppData\Local\Temp\tmp7186186.exe85⤵PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7186420.exeC:\Users\Admin\AppData\Local\Temp\tmp7186420.exe85⤵PID:1884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7184548.exeC:\Users\Admin\AppData\Local\Temp\tmp7184548.exe82⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\tmp7184969.exeC:\Users\Admin\AppData\Local\Temp\tmp7184969.exe83⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7185218.exeC:\Users\Admin\AppData\Local\Temp\tmp7185218.exe83⤵PID:1072
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7183939.exeC:\Users\Admin\AppData\Local\Temp\tmp7183939.exe80⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\tmp7184610.exeC:\Users\Admin\AppData\Local\Temp\tmp7184610.exe81⤵PID:1640
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\tmp7186326.exeC:\Users\Admin\AppData\Local\Temp\tmp7186326.exe83⤵PID:912
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\tmp7186872.exeC:\Users\Admin\AppData\Local\Temp\tmp7186872.exe85⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7187231.exeC:\Users\Admin\AppData\Local\Temp\tmp7187231.exe85⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\tmp7188588.exeC:\Users\Admin\AppData\Local\Temp\tmp7188588.exe86⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7189181.exeC:\Users\Admin\AppData\Local\Temp\tmp7189181.exe86⤵PID:1368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7186435.exeC:\Users\Admin\AppData\Local\Temp\tmp7186435.exe83⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\tmp7186856.exeC:\Users\Admin\AppData\Local\Temp\tmp7186856.exe84⤵
- Drops file in System32 directory
PID:976 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\tmp7188167.exeC:\Users\Admin\AppData\Local\Temp\tmp7188167.exe86⤵
- Modifies registry class
PID:1076 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\tmp7190117.exeC:\Users\Admin\AppData\Local\Temp\tmp7190117.exe88⤵
- Drops file in System32 directory
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\tmp7191848.exeC:\Users\Admin\AppData\Local\Temp\tmp7191848.exe90⤵PID:1800
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\tmp7195655.exeC:\Users\Admin\AppData\Local\Temp\tmp7195655.exe92⤵PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7196326.exeC:\Users\Admin\AppData\Local\Temp\tmp7196326.exe92⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\tmp7198728.exeC:\Users\Admin\AppData\Local\Temp\tmp7198728.exe93⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7198010.exeC:\Users\Admin\AppData\Local\Temp\tmp7198010.exe93⤵PID:1884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7193190.exeC:\Users\Admin\AppData\Local\Temp\tmp7193190.exe90⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\tmp7195124.exeC:\Users\Admin\AppData\Local\Temp\tmp7195124.exe91⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7196092.exeC:\Users\Admin\AppData\Local\Temp\tmp7196092.exe91⤵PID:1204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7190725.exeC:\Users\Admin\AppData\Local\Temp\tmp7190725.exe88⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\tmp7191412.exeC:\Users\Admin\AppData\Local\Temp\tmp7191412.exe89⤵
- Drops file in System32 directory
PID:564 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\tmp7193065.exeC:\Users\Admin\AppData\Local\Temp\tmp7193065.exe91⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7194485.exeC:\Users\Admin\AppData\Local\Temp\tmp7194485.exe91⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\tmp7195202.exeC:\Users\Admin\AppData\Local\Temp\tmp7195202.exe92⤵
- Drops file in System32 directory
- Modifies registry class
PID:1332 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵
- Drops file in System32 directory
- Modifies registry class
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\tmp7198057.exeC:\Users\Admin\AppData\Local\Temp\tmp7198057.exe94⤵
- Drops file in System32 directory
PID:912 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\tmp7200631.exeC:\Users\Admin\AppData\Local\Temp\tmp7200631.exe96⤵
- Drops file in System32 directory
PID:1456 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\tmp7202784.exeC:\Users\Admin\AppData\Local\Temp\tmp7202784.exe98⤵PID:1088
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\tmp7205654.exeC:\Users\Admin\AppData\Local\Temp\tmp7205654.exe100⤵
- Drops file in System32 directory
- Modifies registry class
PID:756 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\tmp7208182.exeC:\Users\Admin\AppData\Local\Temp\tmp7208182.exe102⤵
- Drops file in System32 directory
PID:1244 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\tmp7210085.exeC:\Users\Admin\AppData\Local\Temp\tmp7210085.exe104⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7210678.exeC:\Users\Admin\AppData\Local\Temp\tmp7210678.exe104⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\tmp7212113.exeC:\Users\Admin\AppData\Local\Temp\tmp7212113.exe105⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7212877.exeC:\Users\Admin\AppData\Local\Temp\tmp7212877.exe105⤵PID:1372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7209196.exeC:\Users\Admin\AppData\Local\Temp\tmp7209196.exe102⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\tmp7209789.exeC:\Users\Admin\AppData\Local\Temp\tmp7209789.exe103⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7210413.exeC:\Users\Admin\AppData\Local\Temp\tmp7210413.exe103⤵PID:1500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7206949.exeC:\Users\Admin\AppData\Local\Temp\tmp7206949.exe100⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\tmp7207792.exeC:\Users\Admin\AppData\Local\Temp\tmp7207792.exe101⤵
- Modifies registry class
PID:576 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\tmp7209336.exeC:\Users\Admin\AppData\Local\Temp\tmp7209336.exe103⤵
- Modifies registry class
PID:968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\tmp7211442.exeC:\Users\Admin\AppData\Local\Temp\tmp7211442.exe105⤵
- Drops file in System32 directory
- Modifies registry class
PID:1080 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"106⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\tmp7213283.exeC:\Users\Admin\AppData\Local\Temp\tmp7213283.exe107⤵PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7214796.exeC:\Users\Admin\AppData\Local\Temp\tmp7214796.exe107⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\tmp7215467.exeC:\Users\Admin\AppData\Local\Temp\tmp7215467.exe108⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7216013.exeC:\Users\Admin\AppData\Local\Temp\tmp7216013.exe108⤵PID:836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7212487.exeC:\Users\Admin\AppData\Local\Temp\tmp7212487.exe105⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\tmp7212955.exeC:\Users\Admin\AppData\Local\Temp\tmp7212955.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:1164 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\tmp7214921.exeC:\Users\Admin\AppData\Local\Temp\tmp7214921.exe108⤵PID:1168
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\tmp7216278.exeC:\Users\Admin\AppData\Local\Temp\tmp7216278.exe110⤵
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\tmp7217698.exeC:\Users\Admin\AppData\Local\Temp\tmp7217698.exe112⤵
- Modifies registry class
PID:572 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\tmp7220085.exeC:\Users\Admin\AppData\Local\Temp\tmp7220085.exe114⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7223891.exeC:\Users\Admin\AppData\Local\Temp\tmp7223891.exe114⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\tmp7225264.exeC:\Users\Admin\AppData\Local\Temp\tmp7225264.exe115⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7225888.exeC:\Users\Admin\AppData\Local\Temp\tmp7225888.exe115⤵PID:1204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7219585.exeC:\Users\Admin\AppData\Local\Temp\tmp7219585.exe112⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\tmp7220755.exeC:\Users\Admin\AppData\Local\Temp\tmp7220755.exe113⤵
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"114⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\tmp7223158.exeC:\Users\Admin\AppData\Local\Temp\tmp7223158.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:1940 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\tmp7224281.exeC:\Users\Admin\AppData\Local\Temp\tmp7224281.exe117⤵PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7225435.exeC:\Users\Admin\AppData\Local\Temp\tmp7225435.exe117⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\tmp7226683.exeC:\Users\Admin\AppData\Local\Temp\tmp7226683.exe118⤵
- Drops file in System32 directory
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\tmp7228509.exeC:\Users\Admin\AppData\Local\Temp\tmp7228509.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:1088 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\tmp7232533.exeC:\Users\Admin\AppData\Local\Temp\tmp7232533.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:1508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-