Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 06:24
Static task
static1
Behavioral task
behavioral1
Sample
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe
Resource
win10v2004-20220812-en
General
-
Target
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe
-
Size
166KB
-
MD5
69239f00ab177dd01230afca766ae13e
-
SHA1
c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
-
SHA256
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
-
SHA512
241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
SSDEEP
3072:actbm2OH6r0C5JC+YY0N83xnprEzfwUkjKr8:3rp5M+YY0eBnRExkWr8
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 63 IoCs
Processes:
intelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exepid process 1408 intelgfx32.exe 1292 intelgfx32.exe 1924 intelgfx32.exe 1884 intelgfx32.exe 4896 intelgfx32.exe 2416 intelgfx32.exe 2576 intelgfx32.exe 2084 intelgfx32.exe 1800 intelgfx32.exe 4944 intelgfx32.exe 2360 intelgfx32.exe 3064 intelgfx32.exe 3644 intelgfx32.exe 3608 intelgfx32.exe 3504 intelgfx32.exe 1904 intelgfx32.exe 2792 intelgfx32.exe 4932 intelgfx32.exe 1340 intelgfx32.exe 4140 intelgfx32.exe 460 intelgfx32.exe 2644 intelgfx32.exe 1848 intelgfx32.exe 776 intelgfx32.exe 644 intelgfx32.exe 1644 intelgfx32.exe 64 intelgfx32.exe 456 intelgfx32.exe 672 intelgfx32.exe 2996 intelgfx32.exe 5084 intelgfx32.exe 1624 intelgfx32.exe 4820 intelgfx32.exe 4920 intelgfx32.exe 4076 intelgfx32.exe 2508 intelgfx32.exe 4408 intelgfx32.exe 1344 intelgfx32.exe 2692 intelgfx32.exe 3368 intelgfx32.exe 3832 intelgfx32.exe 3460 intelgfx32.exe 3588 intelgfx32.exe 3620 intelgfx32.exe 936 intelgfx32.exe 2180 intelgfx32.exe 3464 intelgfx32.exe 2760 intelgfx32.exe 3012 intelgfx32.exe 1796 intelgfx32.exe 1368 intelgfx32.exe 4912 intelgfx32.exe 556 intelgfx32.exe 4152 intelgfx32.exe 2300 intelgfx32.exe 4324 intelgfx32.exe 2696 intelgfx32.exe 1104 intelgfx32.exe 2232 intelgfx32.exe 2312 intelgfx32.exe 1092 intelgfx32.exe 3544 intelgfx32.exe 1824 intelgfx32.exe -
Processes:
resource yara_rule behavioral2/memory/4856-133-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4856-135-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4856-136-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4856-137-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4856-141-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1292-148-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1292-151-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1884-158-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1884-161-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2416-168-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2416-171-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2084-178-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2084-181-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4944-188-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4944-191-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3064-198-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3064-201-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3608-208-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3608-212-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1904-219-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1904-222-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4932-229-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4932-232-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4140-239-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4140-242-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2644-248-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2644-250-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2644-253-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/776-260-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/776-263-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1644-270-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1644-273-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/456-280-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/456-283-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2996-290-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2996-293-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1624-300-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1624-303-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4920-310-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4920-313-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2508-320-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2508-323-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1344-330-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1344-333-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3368-340-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3368-343-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3460-350-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3460-353-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3620-360-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/3620-362-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2180-368-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2180-370-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2760-376-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2760-378-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1796-384-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1796-386-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4912-392-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4912-394-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4152-400-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4152-402-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4324-408-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4324-410-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1104-416-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1104-418-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Checks computer location settings 2 TTPs 32 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
intelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exec252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelgfx32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
intelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exec252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 intelgfx32.exe -
Drops file in System32 directory 64 IoCs
Processes:
intelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exec252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exedescription ioc process File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe File created C:\Windows\SysWOW64\intelgfx32.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File opened for modification C:\Windows\SysWOW64\ intelgfx32.exe File created C:\Windows\SysWOW64\intelgfx32.exe intelgfx32.exe -
Suspicious use of SetThreadContext 32 IoCs
Processes:
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exedescription pid process target process PID 456 set thread context of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 1408 set thread context of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1924 set thread context of 1884 1924 intelgfx32.exe intelgfx32.exe PID 4896 set thread context of 2416 4896 intelgfx32.exe intelgfx32.exe PID 2576 set thread context of 2084 2576 intelgfx32.exe intelgfx32.exe PID 1800 set thread context of 4944 1800 intelgfx32.exe intelgfx32.exe PID 2360 set thread context of 3064 2360 intelgfx32.exe intelgfx32.exe PID 3644 set thread context of 3608 3644 intelgfx32.exe intelgfx32.exe PID 3504 set thread context of 1904 3504 intelgfx32.exe intelgfx32.exe PID 2792 set thread context of 4932 2792 intelgfx32.exe intelgfx32.exe PID 1340 set thread context of 4140 1340 intelgfx32.exe intelgfx32.exe PID 460 set thread context of 2644 460 intelgfx32.exe intelgfx32.exe PID 1848 set thread context of 776 1848 intelgfx32.exe intelgfx32.exe PID 644 set thread context of 1644 644 intelgfx32.exe intelgfx32.exe PID 64 set thread context of 456 64 intelgfx32.exe intelgfx32.exe PID 672 set thread context of 2996 672 intelgfx32.exe intelgfx32.exe PID 5084 set thread context of 1624 5084 intelgfx32.exe intelgfx32.exe PID 4820 set thread context of 4920 4820 intelgfx32.exe intelgfx32.exe PID 4076 set thread context of 2508 4076 intelgfx32.exe intelgfx32.exe PID 4408 set thread context of 1344 4408 intelgfx32.exe intelgfx32.exe PID 2692 set thread context of 3368 2692 intelgfx32.exe intelgfx32.exe PID 3832 set thread context of 3460 3832 intelgfx32.exe intelgfx32.exe PID 3588 set thread context of 3620 3588 intelgfx32.exe intelgfx32.exe PID 936 set thread context of 2180 936 intelgfx32.exe intelgfx32.exe PID 3464 set thread context of 2760 3464 intelgfx32.exe intelgfx32.exe PID 3012 set thread context of 1796 3012 intelgfx32.exe intelgfx32.exe PID 1368 set thread context of 4912 1368 intelgfx32.exe intelgfx32.exe PID 556 set thread context of 4152 556 intelgfx32.exe intelgfx32.exe PID 2300 set thread context of 4324 2300 intelgfx32.exe intelgfx32.exe PID 2696 set thread context of 1104 2696 intelgfx32.exe intelgfx32.exe PID 2232 set thread context of 2312 2232 intelgfx32.exe intelgfx32.exe PID 1092 set thread context of 3544 1092 intelgfx32.exe intelgfx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 32 IoCs
Processes:
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ intelgfx32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exepid process 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe 1292 intelgfx32.exe 1292 intelgfx32.exe 1292 intelgfx32.exe 1292 intelgfx32.exe 1884 intelgfx32.exe 1884 intelgfx32.exe 1884 intelgfx32.exe 1884 intelgfx32.exe 2416 intelgfx32.exe 2416 intelgfx32.exe 2416 intelgfx32.exe 2416 intelgfx32.exe 2084 intelgfx32.exe 2084 intelgfx32.exe 2084 intelgfx32.exe 2084 intelgfx32.exe 4944 intelgfx32.exe 4944 intelgfx32.exe 4944 intelgfx32.exe 4944 intelgfx32.exe 3064 intelgfx32.exe 3064 intelgfx32.exe 3064 intelgfx32.exe 3064 intelgfx32.exe 3608 intelgfx32.exe 3608 intelgfx32.exe 3608 intelgfx32.exe 3608 intelgfx32.exe 1904 intelgfx32.exe 1904 intelgfx32.exe 1904 intelgfx32.exe 1904 intelgfx32.exe 4932 intelgfx32.exe 4932 intelgfx32.exe 4932 intelgfx32.exe 4932 intelgfx32.exe 4140 intelgfx32.exe 4140 intelgfx32.exe 4140 intelgfx32.exe 4140 intelgfx32.exe 2644 intelgfx32.exe 2644 intelgfx32.exe 2644 intelgfx32.exe 2644 intelgfx32.exe 776 intelgfx32.exe 776 intelgfx32.exe 776 intelgfx32.exe 776 intelgfx32.exe 1644 intelgfx32.exe 1644 intelgfx32.exe 1644 intelgfx32.exe 1644 intelgfx32.exe 456 intelgfx32.exe 456 intelgfx32.exe 456 intelgfx32.exe 456 intelgfx32.exe 2996 intelgfx32.exe 2996 intelgfx32.exe 2996 intelgfx32.exe 2996 intelgfx32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exec252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exeintelgfx32.exedescription pid process target process PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 456 wrote to memory of 4856 456 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe PID 4856 wrote to memory of 1408 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe intelgfx32.exe PID 4856 wrote to memory of 1408 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe intelgfx32.exe PID 4856 wrote to memory of 1408 4856 c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1408 wrote to memory of 1292 1408 intelgfx32.exe intelgfx32.exe PID 1292 wrote to memory of 1924 1292 intelgfx32.exe intelgfx32.exe PID 1292 wrote to memory of 1924 1292 intelgfx32.exe intelgfx32.exe PID 1292 wrote to memory of 1924 1292 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1924 wrote to memory of 1884 1924 intelgfx32.exe intelgfx32.exe PID 1884 wrote to memory of 4896 1884 intelgfx32.exe intelgfx32.exe PID 1884 wrote to memory of 4896 1884 intelgfx32.exe intelgfx32.exe PID 1884 wrote to memory of 4896 1884 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 4896 wrote to memory of 2416 4896 intelgfx32.exe intelgfx32.exe PID 2416 wrote to memory of 2576 2416 intelgfx32.exe intelgfx32.exe PID 2416 wrote to memory of 2576 2416 intelgfx32.exe intelgfx32.exe PID 2416 wrote to memory of 2576 2416 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2576 wrote to memory of 2084 2576 intelgfx32.exe intelgfx32.exe PID 2084 wrote to memory of 1800 2084 intelgfx32.exe intelgfx32.exe PID 2084 wrote to memory of 1800 2084 intelgfx32.exe intelgfx32.exe PID 2084 wrote to memory of 1800 2084 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 1800 wrote to memory of 4944 1800 intelgfx32.exe intelgfx32.exe PID 4944 wrote to memory of 2360 4944 intelgfx32.exe intelgfx32.exe PID 4944 wrote to memory of 2360 4944 intelgfx32.exe intelgfx32.exe PID 4944 wrote to memory of 2360 4944 intelgfx32.exe intelgfx32.exe PID 2360 wrote to memory of 3064 2360 intelgfx32.exe intelgfx32.exe PID 2360 wrote to memory of 3064 2360 intelgfx32.exe intelgfx32.exe PID 2360 wrote to memory of 3064 2360 intelgfx32.exe intelgfx32.exe PID 2360 wrote to memory of 3064 2360 intelgfx32.exe intelgfx32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe"C:\Users\Admin\AppData\Local\Temp\c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe"C:\Users\Admin\AppData\Local\Temp\c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Users\Admin\AppData\Local\Temp\C252FA~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Users\Admin\AppData\Local\Temp\C252FA~1.EXE4⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE6⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE8⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE10⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE12⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE14⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3644 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE16⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3608 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3504 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE18⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2792 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE20⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4932 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1340 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE22⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4140 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:460 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE24⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1848 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE26⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:644 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE28⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:64 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE30⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:456 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:672 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE32⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5084 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE34⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1624 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4820 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE36⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4920 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4076 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE38⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2508 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4408 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE40⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1344 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2692 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE42⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3368 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3832 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE44⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3460 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3588 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE46⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3620 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:936 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE48⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2180 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3464 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE50⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2760 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3012 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE52⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1796 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1368 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE54⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4912 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:556 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE56⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4152 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2300 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE58⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2696 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE60⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:1104 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE62⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:2312 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1092 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE64⤵
- Executes dropped EXE
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
PID:3544 -
C:\Windows\SysWOW64\intelgfx32.exe"C:\Windows\system32\intelgfx32.exe" C:\Windows\SysWOW64\INTELG~1.EXE65⤵
- Executes dropped EXE
PID:1824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
Filesize
166KB
MD569239f00ab177dd01230afca766ae13e
SHA1c85e3f5edc4c4f8d5483fc6e5c1e12003277601d
SHA256c252fa36b3753bb19c034bd3c97b52cfdca0bed6f871ac1c91e5504aecb8154c
SHA512241dc7b2b72fbc05df322f1399d76b467f9ac93a43156554ff90bd8f1923ff12a94093f08c5c1f6412ded176358aca3541c533fca9c434ad08741a1e9e243ae3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e