Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
14-05-2020 09:25
Static task
static1
Behavioral task
behavioral1
Sample
my_presentation_c1l.js
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
my_presentation_c1l.js
-
Size
3.8MB
-
MD5
763c2375aea17fffc6c0e24c2808570c
-
SHA1
10f7b2d55a9a10902b91fb1c0e632e7db257006e
-
SHA256
e4276d8f476bc00d0e1b946a5e4da025575753c7c1b4bbff3408f8a07461f72d
-
SHA512
9a59f0c887368105ff7a5a329a775ff107a7e9ed306d56e4471aa4f7258b581ecc7960edb0ce89dbc411b23244fb45e561b4e2debbd71699df77467e2bd68beb
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1372 regsvr32.exe -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 524 iexplore.exe 524 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 524 iexplore.exe 524 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 524 iexplore.exe 524 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeExplorer.EXEpid process 1016 powershell.exe 1016 powershell.exe 1336 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1016 powershell.exe Token: SeShutdownPrivilege 1336 Explorer.EXE -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 1016 set thread context of 1336 1016 powershell.exe Explorer.EXE PID 1336 set thread context of 1644 1336 Explorer.EXE cmd.exe PID 1336 set thread context of 524 1336 Explorer.EXE iexplore.exe PID 1644 set thread context of 1924 1644 cmd.exe PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 1924 PING.EXE -
Checks whether UAC is enabled 3 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
wscript.exeregsvr32.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 1016 wrote to memory of 1476 1016 wscript.exe regsvr32.exe PID 1016 wrote to memory of 1476 1016 wscript.exe regsvr32.exe PID 1016 wrote to memory of 1476 1016 wscript.exe regsvr32.exe PID 1016 wrote to memory of 1476 1016 wscript.exe regsvr32.exe PID 1016 wrote to memory of 1476 1016 wscript.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 1476 wrote to memory of 1372 1476 regsvr32.exe regsvr32.exe PID 524 wrote to memory of 1584 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1584 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1584 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1584 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1896 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1896 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1896 524 iexplore.exe IEXPLORE.EXE PID 524 wrote to memory of 1896 524 iexplore.exe IEXPLORE.EXE PID 1504 wrote to memory of 1016 1504 mshta.exe powershell.exe PID 1504 wrote to memory of 1016 1504 mshta.exe powershell.exe PID 1504 wrote to memory of 1016 1504 mshta.exe powershell.exe PID 1016 wrote to memory of 1552 1016 powershell.exe csc.exe PID 1016 wrote to memory of 1552 1016 powershell.exe csc.exe PID 1016 wrote to memory of 1552 1016 powershell.exe csc.exe PID 1552 wrote to memory of 1844 1552 csc.exe cvtres.exe PID 1552 wrote to memory of 1844 1552 csc.exe cvtres.exe PID 1552 wrote to memory of 1844 1552 csc.exe cvtres.exe PID 1016 wrote to memory of 1828 1016 powershell.exe csc.exe PID 1016 wrote to memory of 1828 1016 powershell.exe csc.exe PID 1016 wrote to memory of 1828 1016 powershell.exe csc.exe PID 1828 wrote to memory of 1752 1828 csc.exe cvtres.exe PID 1828 wrote to memory of 1752 1828 csc.exe cvtres.exe PID 1828 wrote to memory of 1752 1828 csc.exe cvtres.exe PID 1016 wrote to memory of 1336 1016 powershell.exe Explorer.EXE PID 1016 wrote to memory of 1336 1016 powershell.exe Explorer.EXE PID 1016 wrote to memory of 1336 1016 powershell.exe Explorer.EXE PID 1336 wrote to memory of 1644 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1644 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1644 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1644 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 524 1336 Explorer.EXE iexplore.exe PID 1336 wrote to memory of 1644 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 524 1336 Explorer.EXE iexplore.exe PID 1336 wrote to memory of 1644 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 524 1336 Explorer.EXE iexplore.exe PID 1644 wrote to memory of 1924 1644 cmd.exe PING.EXE PID 1336 wrote to memory of 1964 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1964 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1964 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1096 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1096 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1096 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1204 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1204 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1204 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1124 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1124 1336 Explorer.EXE cmd.exe PID 1336 wrote to memory of 1124 1336 Explorer.EXE cmd.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
iexplore.exeExplorer.EXEpid process 524 iexplore.exe 524 iexplore.exe 524 iexplore.exe 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE 1336 Explorer.EXE -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 1016 powershell.exe 1336 Explorer.EXE 1336 Explorer.EXE 1644 cmd.exe -
Processes:
iexplore.exeIEXPLORE.EXEmshta.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007cf8d5bd09b0364592b95b96ab3123880000000002000000000010660000000100002000000068d331a36cb299c6deb332b7fc6d59d6501287c8b75a8c23bcd8d0b475008929000000000e800000000200002000000042d3c29b58c7b7368b8ffdbefa0f7c81f34898132811cb35b7cebf7d400062152000000027af4a8c2bcd82733ea06a2bdb8a2f25adf00cd4c5775cfe469ff8f86775b40040000000566945a623ac3439154fc24262c4fa5d12e1321a47ae18ff07e7161946315b4ffb04560c9ca31989a673e1478972d75bc8f56fba1dbaf256cf05ee675654d5cb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEBD1991-95D5-11EA-818A-DE6ED157E5B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "296220562" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1052af87e229d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SendNotifyMessage
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: MapViewOfSection
PID:1336 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\my_presentation_c1l.js2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\zPNqVPAAFG.txt3⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\zPNqVPAAFG.txt4⤵
- Loads dropped DLL
PID:1372
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\136B3805-56F5-BDAC-F8F7-EA41AC1BBE05\\Efsltprf'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:1504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\136B3805-56F5-BDAC-F8F7-EA41AC1BBE05").dmrctcls))3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1016 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iynm4bee\iynm4bee.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES930B.tmp" "c:\Users\Admin\AppData\Local\Temp\iynm4bee\CSC67419F56B60349F0B0EF9BAC41AA6CC.TMP"5⤵PID:1844
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ukknafas\ukknafas.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES93A7.tmp" "c:\Users\Admin\AppData\Local\Temp\ukknafas\CSC998B2D63E14C404BA3F47816B7F43091.TMP"5⤵PID:1752
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\zPNqVPAAFG.txt"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:1644 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Runs ping.exe
PID:1924
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\24C0.bi1"2⤵PID:1964
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1688
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\262C.bi1"2⤵PID:1096
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1940
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\24C0.bi1"2⤵PID:1204
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\262C.bi1"2⤵PID:1124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Modifies Internet Explorer settings
PID:524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:524 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:1584
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:524 CREDAT:406538 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
PID:1896
-