Overview
overview
10Static
static
10gm.rar
windows7-x64
3gm.rar
windows10-2004-x64
317ffd90d20...e1.dll
windows7-x64
117ffd90d20...e1.dll
windows10-2004-x64
11caf510598...e1.exe
windows7-x64
101caf510598...e1.exe
windows10-2004-x64
11d88c47417...67.exe
windows7-x64
11d88c47417...67.exe
windows10-2004-x64
51ecb597741...af.exe
windows7-x64
1ecb597741...af.exe
windows10-2004-x64
2a5fe7d49f...b5.exe
windows7-x64
12a5fe7d49f...b5.exe
windows10-2004-x64
12c1aa4fa14...dc.exe
windows7-x64
12c1aa4fa14...dc.exe
windows10-2004-x64
134d62f47e1...6e.exe
windows7-x64
334d62f47e1...6e.exe
windows10-2004-x64
338f1b8c868...05.exe
windows7-x64
1038f1b8c868...05.exe
windows10-2004-x64
1040d8e3dae5...04.exe
windows7-x64
1040d8e3dae5...04.exe
windows10-2004-x64
10410ee08c8a...59.exe
windows7-x64
6410ee08c8a...59.exe
windows10-2004-x64
6423b7b37b1...42.exe
windows7-x64
1423b7b37b1...42.exe
windows10-2004-x64
14315b6e87c...0b.exe
windows7-x64
74315b6e87c...0b.exe
windows10-2004-x64
7453c6fe9e1...91.exe
windows7-x64
1453c6fe9e1...91.exe
windows10-2004-x64
14a841216cb...37.exe
windows7-x64
14a841216cb...37.exe
windows10-2004-x64
14e180437ef...a9.exe
windows7-x64
14e180437ef...a9.exe
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2023 14:45
Behavioral task
behavioral1
Sample
gm.rar
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
gm.rar
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
17ffd90d20cbd49c4e0d65a484eeae65a107d5bad9582afc51c4ead8bbc147e1.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
17ffd90d20cbd49c4e0d65a484eeae65a107d5bad9582afc51c4ead8bbc147e1.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
1caf5105988781e29d93e58abcbf3bf4c973eca1a207803629bd5cf901ef5be1.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
1caf5105988781e29d93e58abcbf3bf4c973eca1a207803629bd5cf901ef5be1.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
1d88c47417c082378c735c9e8180ea63627d5efff35852f1bb06fe6705581267.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
1d88c47417c082378c735c9e8180ea63627d5efff35852f1bb06fe6705581267.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
1ecb59774182d0d0a04b418249428b621159838bd2bcdc1a3a7b871a65dd90af.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
1ecb59774182d0d0a04b418249428b621159838bd2bcdc1a3a7b871a65dd90af.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
2a5fe7d49fcf65525cfbefaca92a12a0d2917d15f348a48fc7a4de7ae50776b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
2a5fe7d49fcf65525cfbefaca92a12a0d2917d15f348a48fc7a4de7ae50776b5.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
2c1aa4fa14d7055f2239dbb29ab15089cb2752e9f94ec7a360d275dd607314dc.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
2c1aa4fa14d7055f2239dbb29ab15089cb2752e9f94ec7a360d275dd607314dc.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
34d62f47e1fe45dd6309326ef696012f2473b0157e1278eea3826a95829da36e.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
34d62f47e1fe45dd6309326ef696012f2473b0157e1278eea3826a95829da36e.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral17
Sample
38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral19
Sample
40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral21
Sample
410ee08c8a84fbb947d5f4635c95c6c8d244a51855afd4f6aa0e82dba1c38a59.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
410ee08c8a84fbb947d5f4635c95c6c8d244a51855afd4f6aa0e82dba1c38a59.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral23
Sample
423b7b37b1925762c4417d81bd0f434f9760c1ed844b4b47ee7f25c8d0740242.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
423b7b37b1925762c4417d81bd0f434f9760c1ed844b4b47ee7f25c8d0740242.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral25
Sample
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral27
Sample
453c6fe9e176af08b176430630a4eec6f1de09f7f147248dc905dc9823af1b91.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
453c6fe9e176af08b176430630a4eec6f1de09f7f147248dc905dc9823af1b91.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral29
Sample
4a841216cbbd4a587cc579434a043c17f54e3eb0e7ff615b3985411587dfa837.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
4a841216cbbd4a587cc579434a043c17f54e3eb0e7ff615b3985411587dfa837.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral31
Sample
4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe
Resource
win10v2004-20230831-en
General
-
Target
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe
-
Size
3.9MB
-
MD5
05e136c5e18d962fc7cc490a48bf43c5
-
SHA1
db3a52fb85741df954508410d864a3b8d8a7bb36
-
SHA256
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b
-
SHA512
e5770d49869f22761d6984298dfb34292719e743a018d48ebcef1c0430067eab83436b846a98b7e7439ead01d80ad0078d132e1333f404b0d0a14edc92f7c487
-
SSDEEP
98304:wuv7TVLSNplylkdcHc6H5aE1LQx84rK5aKYea:XLSNpl2hya0x84rKcKYea
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\International\Geo\Nation 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe -
Executes dropped EXE 64 IoCs
pid Process 3836 dll.exe 2512 PhotoInstrument.exe 4896 dll.exe 2516 dll.exe 3376 PhotoInstrument.exe 4468 dll.exe 2992 dll.exe 4800 dll.exe 3388 dll.exe 4644 dll.exe 2860 dll.exe 652 dll.exe 4160 dll.exe 5020 dll.exe 4324 dll.exe 3952 dll.exe 3164 dll.exe 3864 dll.exe 1840 dll.exe 2836 dll.exe 4364 dll.exe 628 dll.exe 2592 dll.exe 4228 dll.exe 852 dll.exe 3772 dll.exe 3404 dll.exe 2680 dll.exe 4388 dll.exe 1608 WerFault.exe 4664 dll.exe 2012 dll.exe 2496 dll.exe 3732 dll.exe 3372 dll.exe 2772 dll.exe 3784 dll.exe 3844 dll.exe 4720 dll.exe 1076 dll.exe 3744 dll.exe 4996 dll.exe 60 dll.exe 3644 dll.exe 4408 dll.exe 792 dll.exe 1840 dll.exe 2836 dll.exe 1544 dll.exe 1504 dll.exe 4832 dll.exe 4416 dll.exe 3884 dll.exe 3380 dll.exe 4316 dll.exe 4812 dll.exe 5008 dll.exe 1592 dll.exe 4908 WerFault.exe 4628 dll.exe 4648 dll.exe 1552 dll.exe 652 dll.exe 3796 dll.exe -
Loads dropped DLL 1 IoCs
pid Process 2512 PhotoInstrument.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini dll.exe File created C:\Windows\assembly\Desktop.ini dll.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\__tmp_rar_sfx_access_check_240614671 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File created \??\c:\windows\SysWOW64\dll.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File opened for modification \??\c:\windows\SysWOW64\dll.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File created \??\c:\windows\SysWOW64\PhotoInstrument.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File opened for modification \??\c:\windows\SysWOW64\PhotoInstrument.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 3376 2512 PhotoInstrument.exe 91 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly dll.exe File created C:\Windows\assembly\Desktop.ini dll.exe File opened for modification C:\Windows\assembly\Desktop.ini dll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1608 3376 WerFault.exe 91 -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\Desktop\FontSmoothing = "0" PhotoInstrument.exe Set value (str) \REGISTRY\USER\S-1-5-21-4078585466-1563564224-3678410669-1000\Control Panel\Desktop\FontSmoothing = "2" PhotoInstrument.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2512 PhotoInstrument.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3836 dll.exe Token: 33 3836 dll.exe Token: SeIncBasePriorityPrivilege 3836 dll.exe Token: SeDebugPrivilege 4896 dll.exe Token: 33 4896 dll.exe Token: SeIncBasePriorityPrivilege 4896 dll.exe Token: SeDebugPrivilege 2516 dll.exe Token: 33 2516 dll.exe Token: SeIncBasePriorityPrivilege 2516 dll.exe Token: SeDebugPrivilege 4468 dll.exe Token: 33 4468 dll.exe Token: SeIncBasePriorityPrivilege 4468 dll.exe Token: SeDebugPrivilege 2992 dll.exe Token: 33 2992 dll.exe Token: SeIncBasePriorityPrivilege 2992 dll.exe Token: SeDebugPrivilege 4800 dll.exe Token: 33 4800 dll.exe Token: SeIncBasePriorityPrivilege 4800 dll.exe Token: SeDebugPrivilege 3388 dll.exe Token: 33 3388 dll.exe Token: SeIncBasePriorityPrivilege 3388 dll.exe Token: SeDebugPrivilege 4644 dll.exe Token: 33 4644 dll.exe Token: SeIncBasePriorityPrivilege 4644 dll.exe Token: SeDebugPrivilege 2860 dll.exe Token: 33 2860 dll.exe Token: SeIncBasePriorityPrivilege 2860 dll.exe Token: SeDebugPrivilege 652 dll.exe Token: 33 652 dll.exe Token: SeIncBasePriorityPrivilege 652 dll.exe Token: SeDebugPrivilege 4160 dll.exe Token: 33 4160 dll.exe Token: SeIncBasePriorityPrivilege 4160 dll.exe Token: SeDebugPrivilege 5020 dll.exe Token: 33 5020 dll.exe Token: SeIncBasePriorityPrivilege 5020 dll.exe Token: SeDebugPrivilege 4324 dll.exe Token: 33 4324 dll.exe Token: SeIncBasePriorityPrivilege 4324 dll.exe Token: SeDebugPrivilege 3952 dll.exe Token: 33 3952 dll.exe Token: SeIncBasePriorityPrivilege 3952 dll.exe Token: SeDebugPrivilege 3164 dll.exe Token: 33 3164 dll.exe Token: SeIncBasePriorityPrivilege 3164 dll.exe Token: SeDebugPrivilege 3864 dll.exe Token: 33 3864 dll.exe Token: SeIncBasePriorityPrivilege 3864 dll.exe Token: SeDebugPrivilege 1840 dll.exe Token: 33 1840 dll.exe Token: SeIncBasePriorityPrivilege 1840 dll.exe Token: SeDebugPrivilege 2836 dll.exe Token: 33 2836 dll.exe Token: SeIncBasePriorityPrivilege 2836 dll.exe Token: SeDebugPrivilege 4364 dll.exe Token: 33 4364 dll.exe Token: SeIncBasePriorityPrivilege 4364 dll.exe Token: SeDebugPrivilege 628 dll.exe Token: 33 628 dll.exe Token: SeIncBasePriorityPrivilege 628 dll.exe Token: SeDebugPrivilege 2592 dll.exe Token: 33 2592 dll.exe Token: SeIncBasePriorityPrivilege 2592 dll.exe Token: SeDebugPrivilege 4228 dll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3836 2144 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 85 PID 2144 wrote to memory of 3836 2144 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 85 PID 2144 wrote to memory of 2512 2144 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 86 PID 2144 wrote to memory of 2512 2144 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 86 PID 2144 wrote to memory of 2512 2144 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 86 PID 3836 wrote to memory of 4896 3836 dll.exe 88 PID 3836 wrote to memory of 4896 3836 dll.exe 88 PID 4896 wrote to memory of 2516 4896 dll.exe 89 PID 4896 wrote to memory of 2516 4896 dll.exe 89 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2512 wrote to memory of 3376 2512 PhotoInstrument.exe 91 PID 2516 wrote to memory of 4468 2516 dll.exe 90 PID 2516 wrote to memory of 4468 2516 dll.exe 90 PID 4468 wrote to memory of 2992 4468 dll.exe 92 PID 4468 wrote to memory of 2992 4468 dll.exe 92 PID 2992 wrote to memory of 4800 2992 dll.exe 93 PID 2992 wrote to memory of 4800 2992 dll.exe 93 PID 4800 wrote to memory of 3388 4800 dll.exe 94 PID 4800 wrote to memory of 3388 4800 dll.exe 94 PID 3388 wrote to memory of 4644 3388 dll.exe 95 PID 3388 wrote to memory of 4644 3388 dll.exe 95 PID 4644 wrote to memory of 2860 4644 dll.exe 96 PID 4644 wrote to memory of 2860 4644 dll.exe 96 PID 2860 wrote to memory of 652 2860 dll.exe 97 PID 2860 wrote to memory of 652 2860 dll.exe 97 PID 652 wrote to memory of 4160 652 dll.exe 99 PID 652 wrote to memory of 4160 652 dll.exe 99 PID 4160 wrote to memory of 5020 4160 dll.exe 100 PID 4160 wrote to memory of 5020 4160 dll.exe 100 PID 5020 wrote to memory of 4324 5020 dll.exe 101 PID 5020 wrote to memory of 4324 5020 dll.exe 101 PID 4324 wrote to memory of 3952 4324 dll.exe 103 PID 4324 wrote to memory of 3952 4324 dll.exe 103 PID 3952 wrote to memory of 3164 3952 dll.exe 105 PID 3952 wrote to memory of 3164 3952 dll.exe 105 PID 3164 wrote to memory of 3864 3164 dll.exe 106 PID 3164 wrote to memory of 3864 3164 dll.exe 106 PID 3864 wrote to memory of 1840 3864 dll.exe 135 PID 3864 wrote to memory of 1840 3864 dll.exe 135 PID 1840 wrote to memory of 2836 1840 dll.exe 136 PID 1840 wrote to memory of 2836 1840 dll.exe 136 PID 2836 wrote to memory of 4364 2836 dll.exe 109 PID 2836 wrote to memory of 4364 2836 dll.exe 109 PID 4364 wrote to memory of 628 4364 dll.exe 110 PID 4364 wrote to memory of 628 4364 dll.exe 110 PID 628 wrote to memory of 2592 628 dll.exe 111 PID 628 wrote to memory of 2592 628 dll.exe 111 PID 2592 wrote to memory of 4228 2592 dll.exe 168 PID 2592 wrote to memory of 4228 2592 dll.exe 168 PID 4228 wrote to memory of 852 4228 dll.exe 113 PID 4228 wrote to memory of 852 4228 dll.exe 113 PID 852 wrote to memory of 3772 852 dll.exe 114 PID 852 wrote to memory of 3772 852 dll.exe 114 PID 3772 wrote to memory of 3404 3772 dll.exe 115 PID 3772 wrote to memory of 3404 3772 dll.exe 115 PID 3404 wrote to memory of 2680 3404 dll.exe 116 PID 3404 wrote to memory of 2680 3404 dll.exe 116 PID 2680 wrote to memory of 4388 2680 dll.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe"C:\Users\Admin\AppData\Local\Temp\4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\windows\SysWOW64\dll.exe"C:\windows\system32\dll.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe18⤵PID:1840
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe19⤵PID:2836
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe23⤵PID:4228
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe24⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe25⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe26⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe27⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe28⤵
- Executes dropped EXE
PID:4388 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe29⤵PID:1608
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe30⤵
- Executes dropped EXE
PID:4664 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe31⤵
- Executes dropped EXE
PID:2012 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe32⤵
- Executes dropped EXE
PID:2496 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe33⤵
- Executes dropped EXE
PID:3732 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe34⤵
- Executes dropped EXE
PID:3372 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe35⤵
- Executes dropped EXE
PID:2772 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe36⤵PID:3784
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe37⤵
- Executes dropped EXE
PID:3844 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe38⤵
- Executes dropped EXE
PID:4720 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe39⤵PID:1076
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe40⤵PID:3744
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe41⤵
- Executes dropped EXE
PID:4996 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe42⤵
- Executes dropped EXE
PID:60 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe43⤵
- Executes dropped EXE
PID:3644 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe44⤵PID:4408
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe45⤵
- Executes dropped EXE
PID:792 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe48⤵PID:1544
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe49⤵
- Executes dropped EXE
PID:1504 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe50⤵
- Executes dropped EXE
PID:4832 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe51⤵
- Executes dropped EXE
PID:4416 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe52⤵
- Executes dropped EXE
PID:3884 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe53⤵PID:3380
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe54⤵
- Executes dropped EXE
PID:4316 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe55⤵PID:4812
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe56⤵
- Executes dropped EXE
PID:5008 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe57⤵
- Executes dropped EXE
PID:1592 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe58⤵PID:4908
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe59⤵
- Executes dropped EXE
PID:4628 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe60⤵
- Executes dropped EXE
PID:4648 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe61⤵
- Executes dropped EXE
PID:1552 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe62⤵
- Executes dropped EXE
PID:652 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe63⤵
- Executes dropped EXE
PID:3796 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe64⤵PID:2176
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe65⤵PID:3192
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe66⤵PID:3212
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe67⤵PID:1724
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe68⤵PID:5028
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe69⤵
- Executes dropped EXE
PID:3744 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe70⤵PID:768
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe71⤵PID:2288
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe72⤵PID:3320
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe73⤵
- Executes dropped EXE
PID:4408 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe74⤵PID:1620
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe75⤵PID:2508
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe76⤵PID:1920
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe77⤵PID:4816
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe78⤵PID:2396
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe79⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe80⤵PID:2976
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe81⤵PID:3432
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe82⤵PID:2376
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe83⤵PID:3136
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe84⤵PID:4428
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe85⤵PID:4304
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe86⤵PID:632
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe87⤵PID:764
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe88⤵PID:1608
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe89⤵PID:4240
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe90⤵PID:4768
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe91⤵PID:3044
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe92⤵PID:2948
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe93⤵
- Executes dropped EXE
PID:3784 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe94⤵PID:4808
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe95⤵PID:4168
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe96⤵
- Executes dropped EXE
PID:1076 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe97⤵PID:648
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe98⤵PID:3816
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe99⤵PID:3520
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe100⤵PID:4580
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe101⤵PID:1660
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe102⤵PID:4332
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe103⤵PID:2364
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe104⤵PID:3052
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe105⤵PID:4088
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe106⤵PID:4364
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe107⤵PID:3948
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe108⤵PID:1180
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe109⤵PID:2228
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe110⤵PID:3984
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe111⤵PID:4696
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe112⤵PID:1716
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe113⤵
- Executes dropped EXE
PID:3380 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe114⤵PID:4988
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe115⤵PID:1444
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe116⤵PID:4592
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe117⤵PID:2604
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe118⤵PID:1876
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe119⤵PID:1880
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe120⤵PID:2668
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe121⤵PID:1224
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe122⤵PID:3548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-