Analysis
-
max time kernel
144s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:21
Behavioral task
behavioral1
Sample
662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe
Resource
win10v2004-20220812-en
General
-
Target
662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe
-
Size
689KB
-
MD5
0096ca85e4bb7a97cd221506913a0b40
-
SHA1
cde8488ff9551946ddd55d5c8afc85c5da1dae4f
-
SHA256
662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641
-
SHA512
38b822a9571898b44fa143b1032ea701d0a1ebe88f76eb7bbdedbd31cf75cfa5b5e605ae68905a9b74ace2b077917f8a5b6e7ce275fea0d78906a8c75727f92e
-
SSDEEP
12288:HPIR9PePhR9PuPhR9P7PIR9PePhR9PuPhR9PMPIR9PePhR9PuPhR9P:QRSRmRmRSRmRJRSRmR
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 916 tmp7071540.exe 868 tmp7071572.exe 860 tmp7071665.exe 1272 tmp7071759.exe 1008 tmp7071837.exe 1068 tmp7072086.exe 932 notpad.exe 280 tmp7072804.exe 1388 tmp7073054.exe 1032 notpad.exe 1596 tmp7074442.exe 836 tmp7074660.exe 880 notpad.exe 1560 tmp7074894.exe 1184 tmp7075066.exe 936 notpad.exe 1848 tmp7075378.exe 1340 notpad.exe 388 tmp7075472.exe 1248 tmp7075596.exe 876 tmp7075690.exe 784 notpad.exe 1008 tmp7075877.exe 1616 tmp7075955.exe 1584 notpad.exe 828 tmp7076064.exe 1728 tmp7076127.exe 1860 notpad.exe 1836 tmp7076267.exe 1640 tmp7076345.exe 560 notpad.exe 2032 tmp7076532.exe 1736 tmp7076579.exe 1552 notpad.exe 1108 tmp7076735.exe 1032 tmp7076860.exe 712 notpad.exe 1652 tmp7076985.exe 1828 tmp7077016.exe 1700 notpad.exe 968 notpad.exe 1268 tmp7077312.exe 868 tmp7077390.exe 2000 notpad.exe 1116 tmp7077624.exe 1532 tmp7077656.exe 596 notpad.exe 2028 tmp7077780.exe 1612 tmp7077843.exe 1716 notpad.exe 784 tmp7077983.exe 1588 tmp7078030.exe 828 notpad.exe 316 tmp7078139.exe 1488 tmp7078170.exe 1628 notpad.exe 532 tmp7078326.exe 1120 tmp7078358.exe 560 notpad.exe 1508 tmp7078529.exe 1988 tmp7078560.exe 1072 notpad.exe 1108 tmp7078779.exe 1996 tmp7078810.exe -
resource yara_rule behavioral1/files/0x000a000000012302-59.dat upx behavioral1/memory/1848-64-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000a000000012302-63.dat upx behavioral1/files/0x000a000000012302-62.dat upx behavioral1/files/0x000a000000012302-60.dat upx behavioral1/files/0x0008000000012314-75.dat upx behavioral1/memory/868-74-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000012314-73.dat upx behavioral1/files/0x0008000000012314-70.dat upx behavioral1/files/0x0008000000012314-69.dat upx behavioral1/memory/1272-85-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001232f-91.dat upx behavioral1/files/0x000900000001232f-92.dat upx behavioral1/files/0x000900000001232f-95.dat upx behavioral1/files/0x000900000001232f-94.dat upx behavioral1/files/0x0008000000012326-101.dat upx behavioral1/files/0x000900000001232f-111.dat upx behavioral1/files/0x000900000001232f-109.dat upx behavioral1/memory/932-108-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001232f-107.dat upx behavioral1/memory/1032-114-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x0008000000012326-120.dat upx behavioral1/files/0x000900000001232f-125.dat upx behavioral1/files/0x000900000001232f-130.dat upx behavioral1/memory/1032-129-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001232f-127.dat upx behavioral1/files/0x0008000000012326-137.dat upx behavioral1/memory/880-146-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000900000001232f-143.dat upx behavioral1/files/0x000900000001232f-142.dat upx behavioral1/files/0x000900000001232f-148.dat upx behavioral1/files/0x0008000000012326-154.dat upx behavioral1/memory/936-158-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1340-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/784-170-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1584-176-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1860-177-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1860-181-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/560-188-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1552-194-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/712-199-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1700-203-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/968-211-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2000-216-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/596-222-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1716-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/828-235-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1628-241-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/560-246-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1072-250-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1664-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1980-257-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1184-260-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1268-263-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/592-266-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/596-268-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1616-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1728-274-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/544-278-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1744-280-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1988-284-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1032-286-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1016-288-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1016-291-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 64 IoCs
pid Process 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 868 tmp7071572.exe 868 tmp7071572.exe 868 tmp7071572.exe 868 tmp7071572.exe 1272 tmp7071759.exe 1272 tmp7071759.exe 1272 tmp7071759.exe 1272 tmp7071759.exe 600 WerFault.exe 600 WerFault.exe 916 tmp7071540.exe 916 tmp7071540.exe 932 notpad.exe 932 notpad.exe 932 notpad.exe 280 tmp7072804.exe 280 tmp7072804.exe 1032 notpad.exe 1032 notpad.exe 1032 notpad.exe 1596 tmp7074442.exe 1596 tmp7074442.exe 880 notpad.exe 880 notpad.exe 880 notpad.exe 1560 tmp7074894.exe 1560 tmp7074894.exe 936 notpad.exe 936 notpad.exe 1848 tmp7075378.exe 1848 tmp7075378.exe 936 notpad.exe 1340 notpad.exe 1340 notpad.exe 1340 notpad.exe 1248 tmp7075596.exe 1248 tmp7075596.exe 784 notpad.exe 784 notpad.exe 784 notpad.exe 1008 tmp7075877.exe 1008 tmp7075877.exe 1584 notpad.exe 1584 notpad.exe 1584 notpad.exe 828 tmp7076064.exe 828 tmp7076064.exe 600 WerFault.exe 1860 notpad.exe 1860 notpad.exe 1860 notpad.exe 1836 tmp7076267.exe 1836 tmp7076267.exe 560 notpad.exe 560 notpad.exe 560 notpad.exe 2032 tmp7076532.exe 2032 tmp7076532.exe 1552 notpad.exe 1552 notpad.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7081478.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7083053.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7084333.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7088545.exe File created C:\Windows\SysWOW64\notpad.exe tmp7088545.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7172894.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7078139.exe File created C:\Windows\SysWOW64\notpad.exe tmp7076985.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7085643.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7085643.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7085783.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7091197.exe File created C:\Windows\SysWOW64\notpad.exe tmp7176732.exe File created C:\Windows\SysWOW64\notpad.exe tmp7074894.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7075877.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7076735.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7077780.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7081478.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7084333.exe File created C:\Windows\SysWOW64\notpad.exe tmp7085783.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7138621.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7075877.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7180429.exe File created C:\Windows\SysWOW64\notpad.exe tmp7182738.exe File created C:\Windows\SysWOW64\notpad.exe notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7088623.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7177980.exe File created C:\Windows\SysWOW64\notpad.exe tmp7081212.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7077983.exe File created C:\Windows\SysWOW64\notpad.exe tmp7078326.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7176732.exe File created C:\Windows\SysWOW64\notpad.exe tmp7077312.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7085487.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7081337.exe File created C:\Windows\SysWOW64\notpad.exe tmp7134924.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7136655.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7174797.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7182738.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7201037.exe File created C:\Windows\SysWOW64\notpad.exe tmp7085518.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7090011.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7090011.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7172894.exe File created C:\Windows\SysWOW64\notpad.exe tmp7079980.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7078950.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7079793.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7088545.exe File created C:\Windows\SysWOW64\notpad.exe tmp7136094.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7176732.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7077188.exe File created C:\Windows\SysWOW64\notpad.exe tmp7076735.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7085487.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7075378.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7085518.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7179634.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7077780.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7134924.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7136094.exe File opened for modification C:\Windows\SysWOW64\fsb.stb tmp7183456.exe File created C:\Windows\SysWOW64\notpad.exe tmp7075378.exe File created C:\Windows\SysWOW64\notpad.exe tmp7078950.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7081805.exe File created C:\Windows\SysWOW64\notpad.exe tmp7085971.exe File created C:\Windows\SysWOW64\notpad.exe tmp7077983.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 600 1068 WerFault.exe 33 -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7135438.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7179899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7071540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7078139.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7087468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7174797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7088155.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7089793.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7136094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7134924.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7138621.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7076985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7081805.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7085830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7172894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7177980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7075877.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7080292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7083428.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7085783.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7091197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7136655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7077983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7078529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7081337.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7182863.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7074894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7079153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7084333.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7171475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7182738.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7183456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7075378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7077780.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7133020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7076532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7077188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7078779.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7084738.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7086064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7088623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7131492.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7076267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7076735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7084582.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7085518.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7090011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7201037.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7077624.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7081212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7085487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7074442.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7083053.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7134159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7075596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7087281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7178042.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7180429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7072804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7078326.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7085971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7080120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7083334.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 916 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 28 PID 1848 wrote to memory of 916 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 28 PID 1848 wrote to memory of 916 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 28 PID 1848 wrote to memory of 916 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 28 PID 1848 wrote to memory of 868 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 29 PID 1848 wrote to memory of 868 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 29 PID 1848 wrote to memory of 868 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 29 PID 1848 wrote to memory of 868 1848 662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe 29 PID 868 wrote to memory of 860 868 tmp7071572.exe 30 PID 868 wrote to memory of 860 868 tmp7071572.exe 30 PID 868 wrote to memory of 860 868 tmp7071572.exe 30 PID 868 wrote to memory of 860 868 tmp7071572.exe 30 PID 868 wrote to memory of 1272 868 tmp7071572.exe 32 PID 868 wrote to memory of 1272 868 tmp7071572.exe 32 PID 868 wrote to memory of 1272 868 tmp7071572.exe 32 PID 868 wrote to memory of 1272 868 tmp7071572.exe 32 PID 1272 wrote to memory of 1008 1272 tmp7071759.exe 31 PID 1272 wrote to memory of 1008 1272 tmp7071759.exe 31 PID 1272 wrote to memory of 1008 1272 tmp7071759.exe 31 PID 1272 wrote to memory of 1008 1272 tmp7071759.exe 31 PID 1272 wrote to memory of 1068 1272 tmp7071759.exe 33 PID 1272 wrote to memory of 1068 1272 tmp7071759.exe 33 PID 1272 wrote to memory of 1068 1272 tmp7071759.exe 33 PID 1272 wrote to memory of 1068 1272 tmp7071759.exe 33 PID 1068 wrote to memory of 600 1068 tmp7072086.exe 34 PID 1068 wrote to memory of 600 1068 tmp7072086.exe 34 PID 1068 wrote to memory of 600 1068 tmp7072086.exe 34 PID 1068 wrote to memory of 600 1068 tmp7072086.exe 34 PID 916 wrote to memory of 932 916 tmp7071540.exe 35 PID 916 wrote to memory of 932 916 tmp7071540.exe 35 PID 916 wrote to memory of 932 916 tmp7071540.exe 35 PID 916 wrote to memory of 932 916 tmp7071540.exe 35 PID 932 wrote to memory of 280 932 notpad.exe 36 PID 932 wrote to memory of 280 932 notpad.exe 36 PID 932 wrote to memory of 280 932 notpad.exe 36 PID 932 wrote to memory of 280 932 notpad.exe 36 PID 932 wrote to memory of 1388 932 notpad.exe 37 PID 932 wrote to memory of 1388 932 notpad.exe 37 PID 932 wrote to memory of 1388 932 notpad.exe 37 PID 932 wrote to memory of 1388 932 notpad.exe 37 PID 280 wrote to memory of 1032 280 tmp7072804.exe 38 PID 280 wrote to memory of 1032 280 tmp7072804.exe 38 PID 280 wrote to memory of 1032 280 tmp7072804.exe 38 PID 280 wrote to memory of 1032 280 tmp7072804.exe 38 PID 1032 wrote to memory of 1596 1032 notpad.exe 39 PID 1032 wrote to memory of 1596 1032 notpad.exe 39 PID 1032 wrote to memory of 1596 1032 notpad.exe 39 PID 1032 wrote to memory of 1596 1032 notpad.exe 39 PID 1032 wrote to memory of 836 1032 notpad.exe 40 PID 1032 wrote to memory of 836 1032 notpad.exe 40 PID 1032 wrote to memory of 836 1032 notpad.exe 40 PID 1032 wrote to memory of 836 1032 notpad.exe 40 PID 1596 wrote to memory of 880 1596 tmp7074442.exe 41 PID 1596 wrote to memory of 880 1596 tmp7074442.exe 41 PID 1596 wrote to memory of 880 1596 tmp7074442.exe 41 PID 1596 wrote to memory of 880 1596 tmp7074442.exe 41 PID 880 wrote to memory of 1560 880 notpad.exe 42 PID 880 wrote to memory of 1560 880 notpad.exe 42 PID 880 wrote to memory of 1560 880 notpad.exe 42 PID 880 wrote to memory of 1560 880 notpad.exe 42 PID 880 wrote to memory of 1184 880 notpad.exe 43 PID 880 wrote to memory of 1184 880 notpad.exe 43 PID 880 wrote to memory of 1184 880 notpad.exe 43 PID 880 wrote to memory of 1184 880 notpad.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe"C:\Users\Admin\AppData\Local\Temp\662925e276c69d0f6a0655e940afdae1196e2324e8babf7927d5aa100e856641.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\tmp7071540.exeC:\Users\Admin\AppData\Local\Temp\tmp7071540.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\tmp7072804.exeC:\Users\Admin\AppData\Local\Temp\tmp7072804.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\tmp7074442.exeC:\Users\Admin\AppData\Local\Temp\tmp7074442.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\tmp7074894.exeC:\Users\Admin\AppData\Local\Temp\tmp7074894.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1560 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:936 -
C:\Users\Admin\AppData\Local\Temp\tmp7075378.exeC:\Users\Admin\AppData\Local\Temp\tmp7075378.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1848 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\tmp7075596.exeC:\Users\Admin\AppData\Local\Temp\tmp7075596.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:784 -
C:\Users\Admin\AppData\Local\Temp\tmp7075877.exeC:\Users\Admin\AppData\Local\Temp\tmp7075877.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:1008 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\tmp7076064.exeC:\Users\Admin\AppData\Local\Temp\tmp7076064.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:828 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\tmp7076267.exeC:\Users\Admin\AppData\Local\Temp\tmp7076267.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1836 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Users\Admin\AppData\Local\Temp\tmp7076532.exeC:\Users\Admin\AppData\Local\Temp\tmp7076532.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\tmp7076735.exeC:\Users\Admin\AppData\Local\Temp\tmp7076735.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:712 -
C:\Users\Admin\AppData\Local\Temp\tmp7076985.exeC:\Users\Admin\AppData\Local\Temp\tmp7076985.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\tmp7077188.exeC:\Users\Admin\AppData\Local\Temp\tmp7077188.exe26⤵
- Drops file in System32 directory
- Modifies registry class
PID:1752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\tmp7077312.exeC:\Users\Admin\AppData\Local\Temp\tmp7077312.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1268 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\tmp7077624.exeC:\Users\Admin\AppData\Local\Temp\tmp7077624.exe30⤵
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:596 -
C:\Users\Admin\AppData\Local\Temp\tmp7077780.exeC:\Users\Admin\AppData\Local\Temp\tmp7077780.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2028 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\tmp7077983.exeC:\Users\Admin\AppData\Local\Temp\tmp7077983.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:784 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:828 -
C:\Users\Admin\AppData\Local\Temp\tmp7078139.exeC:\Users\Admin\AppData\Local\Temp\tmp7078139.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\tmp7078326.exeC:\Users\Admin\AppData\Local\Temp\tmp7078326.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:532 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\tmp7078529.exeC:\Users\Admin\AppData\Local\Temp\tmp7078529.exe40⤵
- Executes dropped EXE
- Modifies registry class
PID:1508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\tmp7078779.exeC:\Users\Admin\AppData\Local\Temp\tmp7078779.exe42⤵
- Executes dropped EXE
- Modifies registry class
PID:1108 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\tmp7078950.exeC:\Users\Admin\AppData\Local\Temp\tmp7078950.exe44⤵
- Drops file in System32 directory
PID:796 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\tmp7079153.exeC:\Users\Admin\AppData\Local\Temp\tmp7079153.exe46⤵
- Modifies registry class
PID:1928 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\tmp7079793.exeC:\Users\Admin\AppData\Local\Temp\tmp7079793.exe48⤵
- Drops file in System32 directory
PID:1436 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\tmp7079980.exeC:\Users\Admin\AppData\Local\Temp\tmp7079980.exe50⤵
- Drops file in System32 directory
PID:936 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\tmp7080120.exeC:\Users\Admin\AppData\Local\Temp\tmp7080120.exe52⤵
- Modifies registry class
PID:1208 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\tmp7080292.exeC:\Users\Admin\AppData\Local\Temp\tmp7080292.exe54⤵
- Modifies registry class
PID:1248 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\tmp7081212.exeC:\Users\Admin\AppData\Local\Temp\tmp7081212.exe56⤵
- Drops file in System32 directory
- Modifies registry class
PID:1592 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\tmp7081337.exeC:\Users\Admin\AppData\Local\Temp\tmp7081337.exe58⤵
- Drops file in System32 directory
- Modifies registry class
PID:776 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\tmp7081478.exeC:\Users\Admin\AppData\Local\Temp\tmp7081478.exe60⤵
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\tmp7081805.exeC:\Users\Admin\AppData\Local\Temp\tmp7081805.exe62⤵
- Drops file in System32 directory
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\tmp7083053.exeC:\Users\Admin\AppData\Local\Temp\tmp7083053.exe64⤵
- Drops file in System32 directory
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\tmp7083334.exeC:\Users\Admin\AppData\Local\Temp\tmp7083334.exe66⤵
- Modifies registry class
PID:1828 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\tmp7083428.exeC:\Users\Admin\AppData\Local\Temp\tmp7083428.exe68⤵
- Modifies registry class
PID:288 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\tmp7084192.exeC:\Users\Admin\AppData\Local\Temp\tmp7084192.exe70⤵PID:272
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\tmp7084333.exeC:\Users\Admin\AppData\Local\Temp\tmp7084333.exe72⤵
- Drops file in System32 directory
- Modifies registry class
PID:868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\tmp7084582.exeC:\Users\Admin\AppData\Local\Temp\tmp7084582.exe74⤵
- Modifies registry class
PID:1532 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\tmp7084738.exeC:\Users\Admin\AppData\Local\Temp\tmp7084738.exe76⤵
- Modifies registry class
PID:1116 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\tmp7085487.exeC:\Users\Admin\AppData\Local\Temp\tmp7085487.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:336 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\tmp7085643.exeC:\Users\Admin\AppData\Local\Temp\tmp7085643.exe80⤵
- Drops file in System32 directory
PID:828 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\tmp7085830.exeC:\Users\Admin\AppData\Local\Temp\tmp7085830.exe82⤵
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\tmp7086017.exeC:\Users\Admin\AppData\Local\Temp\tmp7086017.exe84⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7086626.exeC:\Users\Admin\AppData\Local\Temp\tmp7086626.exe84⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\tmp7086797.exeC:\Users\Admin\AppData\Local\Temp\tmp7086797.exe85⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7087000.exeC:\Users\Admin\AppData\Local\Temp\tmp7087000.exe85⤵PID:1208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7085955.exeC:\Users\Admin\AppData\Local\Temp\tmp7085955.exe82⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\tmp7086064.exeC:\Users\Admin\AppData\Local\Temp\tmp7086064.exe83⤵
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\tmp7086891.exeC:\Users\Admin\AppData\Local\Temp\tmp7086891.exe85⤵PID:528
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\tmp7087281.exeC:\Users\Admin\AppData\Local\Temp\tmp7087281.exe87⤵
- Modifies registry class
PID:1716 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\tmp7087562.exeC:\Users\Admin\AppData\Local\Temp\tmp7087562.exe89⤵PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7088123.exeC:\Users\Admin\AppData\Local\Temp\tmp7088123.exe89⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\tmp7088357.exeC:\Users\Admin\AppData\Local\Temp\tmp7088357.exe90⤵PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7088498.exeC:\Users\Admin\AppData\Local\Temp\tmp7088498.exe90⤵PID:2024
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7087359.exeC:\Users\Admin\AppData\Local\Temp\tmp7087359.exe87⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\tmp7087437.exeC:\Users\Admin\AppData\Local\Temp\tmp7087437.exe88⤵PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7088061.exeC:\Users\Admin\AppData\Local\Temp\tmp7088061.exe88⤵PID:1628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7086969.exeC:\Users\Admin\AppData\Local\Temp\tmp7086969.exe85⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\tmp7087047.exeC:\Users\Admin\AppData\Local\Temp\tmp7087047.exe86⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7087234.exeC:\Users\Admin\AppData\Local\Temp\tmp7087234.exe86⤵PID:860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7086532.exeC:\Users\Admin\AppData\Local\Temp\tmp7086532.exe83⤵PID:1980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7085705.exeC:\Users\Admin\AppData\Local\Temp\tmp7085705.exe80⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\tmp7085783.exeC:\Users\Admin\AppData\Local\Temp\tmp7085783.exe81⤵
- Drops file in System32 directory
- Modifies registry class
PID:1984 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"82⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\tmp7085971.exeC:\Users\Admin\AppData\Local\Temp\tmp7085971.exe83⤵
- Drops file in System32 directory
- Modifies registry class
PID:712 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"84⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\tmp7086376.exeC:\Users\Admin\AppData\Local\Temp\tmp7086376.exe85⤵PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7086579.exeC:\Users\Admin\AppData\Local\Temp\tmp7086579.exe85⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\tmp7086751.exeC:\Users\Admin\AppData\Local\Temp\tmp7086751.exe86⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7086813.exeC:\Users\Admin\AppData\Local\Temp\tmp7086813.exe86⤵PID:1612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7086142.exeC:\Users\Admin\AppData\Local\Temp\tmp7086142.exe83⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\tmp7086595.exeC:\Users\Admin\AppData\Local\Temp\tmp7086595.exe84⤵PID:616
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\tmp7087109.exeC:\Users\Admin\AppData\Local\Temp\tmp7087109.exe86⤵PID:596
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\tmp7087468.exeC:\Users\Admin\AppData\Local\Temp\tmp7087468.exe88⤵
- Modifies registry class
PID:316 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\tmp7088482.exeC:\Users\Admin\AppData\Local\Temp\tmp7088482.exe90⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7089699.exeC:\Users\Admin\AppData\Local\Temp\tmp7089699.exe90⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\tmp7090011.exeC:\Users\Admin\AppData\Local\Temp\tmp7090011.exe91⤵
- Drops file in System32 directory
- Modifies registry class
PID:288 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"92⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\tmp7091711.exeC:\Users\Admin\AppData\Local\Temp\tmp7091711.exe93⤵PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7091930.exeC:\Users\Admin\AppData\Local\Temp\tmp7091930.exe93⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\tmp7133020.exeC:\Users\Admin\AppData\Local\Temp\tmp7133020.exe94⤵
- Modifies registry class
PID:1348 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\tmp7134159.exeC:\Users\Admin\AppData\Local\Temp\tmp7134159.exe96⤵
- Modifies registry class
PID:1696 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\tmp7135438.exeC:\Users\Admin\AppData\Local\Temp\tmp7135438.exe98⤵
- Modifies registry class
PID:836 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\tmp7136406.exeC:\Users\Admin\AppData\Local\Temp\tmp7136406.exe100⤵PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7137420.exeC:\Users\Admin\AppData\Local\Temp\tmp7137420.exe100⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\tmp7138621.exeC:\Users\Admin\AppData\Local\Temp\tmp7138621.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:340 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"102⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\tmp7171475.exeC:\Users\Admin\AppData\Local\Temp\tmp7171475.exe103⤵
- Modifies registry class
PID:1772 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"104⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\tmp7172317.exeC:\Users\Admin\AppData\Local\Temp\tmp7172317.exe105⤵PID:288
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7172613.exeC:\Users\Admin\AppData\Local\Temp\tmp7172613.exe105⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\tmp7173035.exeC:\Users\Admin\AppData\Local\Temp\tmp7173035.exe106⤵PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7173362.exeC:\Users\Admin\AppData\Local\Temp\tmp7173362.exe106⤵PID:1304
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7171662.exeC:\Users\Admin\AppData\Local\Temp\tmp7171662.exe103⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\tmp7172021.exeC:\Users\Admin\AppData\Local\Temp\tmp7172021.exe104⤵PID:1612
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\tmp7172894.exeC:\Users\Admin\AppData\Local\Temp\tmp7172894.exe106⤵
- Drops file in System32 directory
- Modifies registry class
PID:1728 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\tmp7174095.exeC:\Users\Admin\AppData\Local\Temp\tmp7174095.exe108⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7174517.exeC:\Users\Admin\AppData\Local\Temp\tmp7174517.exe108⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\tmp7174938.exeC:\Users\Admin\AppData\Local\Temp\tmp7174938.exe109⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7175078.exeC:\Users\Admin\AppData\Local\Temp\tmp7175078.exe109⤵PID:1680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7173128.exeC:\Users\Admin\AppData\Local\Temp\tmp7173128.exe106⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\tmp7173440.exeC:\Users\Admin\AppData\Local\Temp\tmp7173440.exe107⤵PID:1640
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\tmp7174797.exeC:\Users\Admin\AppData\Local\Temp\tmp7174797.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:1652 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"110⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\tmp7176233.exeC:\Users\Admin\AppData\Local\Temp\tmp7176233.exe111⤵PID:1768
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7176404.exeC:\Users\Admin\AppData\Local\Temp\tmp7176404.exe111⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\tmp7176732.exeC:\Users\Admin\AppData\Local\Temp\tmp7176732.exe112⤵
- Drops file in System32 directory
PID:968 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp7178042.exeC:\Users\Admin\AppData\Local\Temp\tmp7178042.exe114⤵
- Modifies registry class
PID:1140 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\tmp7178963.exeC:\Users\Admin\AppData\Local\Temp\tmp7178963.exe116⤵PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7179103.exeC:\Users\Admin\AppData\Local\Temp\tmp7179103.exe116⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\tmp7179946.exeC:\Users\Admin\AppData\Local\Temp\tmp7179946.exe117⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7180710.exeC:\Users\Admin\AppData\Local\Temp\tmp7180710.exe117⤵PID:388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7178308.exeC:\Users\Admin\AppData\Local\Temp\tmp7178308.exe114⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\tmp7178682.exeC:\Users\Admin\AppData\Local\Temp\tmp7178682.exe115⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7179134.exeC:\Users\Admin\AppData\Local\Temp\tmp7179134.exe115⤵PID:1000
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7177418.exeC:\Users\Admin\AppData\Local\Temp\tmp7177418.exe112⤵PID:1560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7174985.exeC:\Users\Admin\AppData\Local\Temp\tmp7174985.exe109⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\tmp7175421.exeC:\Users\Admin\AppData\Local\Temp\tmp7175421.exe110⤵PID:2012
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\tmp7176716.exeC:\Users\Admin\AppData\Local\Temp\tmp7176716.exe112⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7177574.exeC:\Users\Admin\AppData\Local\Temp\tmp7177574.exe112⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\tmp7177980.exeC:\Users\Admin\AppData\Local\Temp\tmp7177980.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:320 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"114⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\tmp7178448.exeC:\Users\Admin\AppData\Local\Temp\tmp7178448.exe115⤵PID:692
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"116⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\tmp7179634.exeC:\Users\Admin\AppData\Local\Temp\tmp7179634.exe117⤵
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\tmp7182020.exeC:\Users\Admin\AppData\Local\Temp\tmp7182020.exe119⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7182223.exeC:\Users\Admin\AppData\Local\Temp\tmp7182223.exe119⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\tmp7183456.exeC:\Users\Admin\AppData\Local\Temp\tmp7183456.exe120⤵
- Drops file in System32 directory
- Modifies registry class
PID:1768 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\tmp7201037.exeC:\Users\Admin\AppData\Local\Temp\tmp7201037.exe122⤵
- Drops file in System32 directory
- Modifies registry class
PID:1952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-