Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe
Resource
win10v20201028
General
-
Target
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe
-
Size
4.8MB
-
MD5
4bef38ad5d60cf61de788362c8bb49eb
-
SHA1
7986f62d5f99777cc2e2738b05f5bd7c8b3abb50
-
SHA256
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb
-
SHA512
42c69e361c78fafefe17a8833dd5f9d901a73265835d8fe2e5af17ad0fdc99e708f7903f74b0704239f6e6a9e72ba2520a679336e85e59f166c32175e1994be1
Malware Config
Signatures
-
Processes:
yara_rule upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qSRvood = "c:\\Windows\\System32\\qSRvood.exe" ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription ioc process File created C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription ioc process File created \??\c:\Windows\System32\qSRvood.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Drops file in Program Files directory 838 IoCs
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription ioc process File created C:\Program Files\7-Zip\7z.sfx.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\FlickLearningWizard.exe.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\tipresx.dll.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\COPYRIGHT ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\LICENSE ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\sawindbg.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\7-Zip\7z.exe.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ro-ro.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\lv.pak ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\vi.pak ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvStreamingManager.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\Stationery\Garden.jpg ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\vstoee.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\split.avi ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\WindowsAccessBridge-64.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-join.avi ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\System\Ole DB\oledb32r.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\ko.pak ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-GB\tipresx.dll.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\JavaAccessBridge-64.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jaas_nt.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\System\msadc\msadcor.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\mip.exe.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsesp.xml ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\chrome_elf.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2launcher.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\nio.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\7-Zip\Lang\da.txt.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.hi-in.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\COPYRIGHT ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\dt_shmem.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R64.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\TabTip.exe.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\startNetworkServer.bat ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbyclient.jar ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\7-Zip\Lang\be.txt.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jp2native.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\7-Zip\Lang\el.txt.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\System\ado\adojavas.inc ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.vi-vn.dll ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File created C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\fr.pak ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\NOTICE ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 848 636 WerFault.exe ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Modifies Internet Explorer start page 1 TTPs 4 IoCs
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.jbVpCcPiNa.com" ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.TfCtpqHrCR.com" ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.EGTXcBhWVe.com" ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.wHKpjyrBrA.com" ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 5c0000000100000004000000000800001900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c137e000000010000000800000000c001b39667d6017f000000010000000e000000300c060a2b0601040182370a03041d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589100b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000006200000001000000200000000687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739090000000100000042000000304006082b06010505070302060a2b0601040182370a030c060a2b0601040182370a030406082b0601050507030406082b0601050507030106082b060105050703080f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d040000000100000010000000410352dc0ff7501b16f0028eba6f45c520000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exedescription pid process Token: SeLockMemoryPrivilege 636 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe Token: SeLockMemoryPrivilege 636 ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe"C:\Users\Admin\AppData\Local\Temp\ce9b80d650f09360e83a39dfad49c3ec7f4a827bc5a470344cd8573938818bbb.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer start page
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 636 -s 18242⤵
- Program crash
PID:848