Analysis
-
max time kernel
302s -
max time network
312s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
09-09-2021 20:24
Static task
static1
Behavioral task
behavioral1
Sample
7de81647d41ef9c982920e119ebaf27b5affcf26.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
7de81647d41ef9c982920e119ebaf27b5affcf26.exe
-
Size
880KB
-
MD5
72fb1d021cfaa3ef3ea5ddd2aa6edc86
-
SHA1
7de81647d41ef9c982920e119ebaf27b5affcf26
-
SHA256
b7a9576a80944c203ddb7a1fbfbfa2a5806c2419ad193f22b84d0fa4f078a725
-
SHA512
f487c205746f3b9de76de7029fb9fab108c384e55c8d1918120a76feccd1284ab566eedacd5c7b279a8a9ba16c8c357e56dd6c0497866cb3a41d098d9618cd4e
Malware Config
Extracted
Family
gozi_rm3
Attributes
-
build
300981
Extracted
Family
gozi_rm3
Botnet
202108021
C2
https://haverit.xyz
Attributes
-
build
300981
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
rsa_pubkey.plain
aes.plain
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DA64388-11BD-11EC-B2DB-E6C57AC66A15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3C72436-11BD-11EC-B2DB-E6C57AC66A15} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503f1a99caa5d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40106916caa5d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "331298290" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000130f0de9e532fd469563bb34925ae7b500000000020000000000106600000001000020000000f07756a7a9ee1292ab3606b1b5157cba500fb5f7f6dec5c9b9768ff80b125cd2000000000e8000000002000020000000572f96cc85a2897759272da1952e613b839a6cd653449ba2a4910ccb7848e1b620000000803ab894624c204d3967ae39ee5fac7820d5334f3dfedd3db663eed482e3413b400000008e3aec6179594edcc70a36b7256626be962cb24dce3dd2cd5ba58f983da33c6285c9d6b5b032cc82111a4d020eebe702a1eea3fd6d74c90e87884df1076f98e7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000130f0de9e532fd469563bb34925ae7b5000000000200000000001066000000010000200000007df5142b70c5815ffb3694ce1715618bec5c8c3e231d350d044bd3dfab3f756f000000000e8000000002000020000000b73f78dfba4cc8ef0956ff7936ec9c8993ed45150a17e029246a22c69519e49320000000c5f82a431b042113374a89f8c922a20e95d61a2504aa0e56de21da0e8d035f634000000020cd857e516d6f226471e07dc6d9952a903f73d3d5cabb2a060632b01c0b3281f91eadfcb9721d500c04105b38b6f84c8e69051353a89953329f641e21f12740 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000130f0de9e532fd469563bb34925ae7b5000000000200000000001066000000010000200000005439630a8a0c31f067a88cd7e208698a71a461ccec6637d4e7fdc2403fb50726000000000e8000000002000020000000561bed28ae5261c562a966d8b3825f9eb11df2760351a2335bdb6b9e97b42425200000007145c9bbcf30b0d28605c85f656e291eecf3cd8b45addfe055e9f4b559fd561d4000000062c14eecb0b976c6bd8e93dfaaf6932b22b19e2794b923417a24f6fd7c6289228771dd26c27865e364b8b82a377afa04d2b76840cd0fd3e2c4b479906faff1a6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6298E33-11BD-11EC-B2DB-E6C57AC66A15} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05322a0caa5d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91B5CA3B-11BD-11EC-B2DB-E6C57AC66A15} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108f178ccaa5d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9053ab54caa5d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03bac5bcaa5d701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02b7c1ecaa5d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000130f0de9e532fd469563bb34925ae7b500000000020000000000106600000001000020000000116e676f0ed3f8b41f619853746784fff81c9de4f3251d1f613cfd270f20bf61000000000e80000000020000200000003b7e6fa5a00ec9fc6b175cd8a4282d3136d51636301a9a219e9a8b5e3e88b9f6200000005e46ff3b0790a0b6a15bb5db3f0e5572ad2962511453d2a335ea6739b06c81544000000016b667f433376a4a1238f80775fef1881fac31043ca4d0b7fa74d107c13a1de38853d56efb762284750474604c42467ccca5e571bb5eaefd19df16857c3636f5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 3236 iexplore.exe 424 iexplore.exe 2300 iexplore.exe 1712 iexplore.exe 1036 iexplore.exe 2472 iexplore.exe 3192 iexplore.exe 3580 iexplore.exe 1044 iexplore.exe 3936 iexplore.exe 2940 iexplore.exe 3700 iexplore.exe 2868 iexplore.exe 3944 iexplore.exe 1912 iexplore.exe 3016 iexplore.exe 2372 iexplore.exe 964 iexplore.exe 508 iexplore.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3236 iexplore.exe 3236 iexplore.exe 764 IEXPLORE.EXE 764 IEXPLORE.EXE 424 iexplore.exe 424 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 2300 iexplore.exe 2300 iexplore.exe 1876 IEXPLORE.EXE 1876 IEXPLORE.EXE 1712 iexplore.exe 1712 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 1036 iexplore.exe 1036 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2472 iexplore.exe 2472 iexplore.exe 4080 IEXPLORE.EXE 4080 IEXPLORE.EXE 3192 iexplore.exe 3192 iexplore.exe 3528 IEXPLORE.EXE 3528 IEXPLORE.EXE 3580 iexplore.exe 3580 iexplore.exe 1308 IEXPLORE.EXE 1308 IEXPLORE.EXE 1044 iexplore.exe 1044 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 3936 iexplore.exe 3936 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2940 iexplore.exe 2940 iexplore.exe 928 IEXPLORE.EXE 928 IEXPLORE.EXE 3700 iexplore.exe 3700 iexplore.exe 3160 IEXPLORE.EXE 3160 IEXPLORE.EXE 2868 iexplore.exe 2868 iexplore.exe 996 IEXPLORE.EXE 996 IEXPLORE.EXE 3944 iexplore.exe 3944 iexplore.exe 3848 IEXPLORE.EXE 3848 IEXPLORE.EXE 1912 iexplore.exe 1912 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 3016 iexplore.exe 3016 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 3236 wrote to memory of 764 3236 iexplore.exe 82 PID 3236 wrote to memory of 764 3236 iexplore.exe 82 PID 3236 wrote to memory of 764 3236 iexplore.exe 82 PID 424 wrote to memory of 3036 424 iexplore.exe 84 PID 424 wrote to memory of 3036 424 iexplore.exe 84 PID 424 wrote to memory of 3036 424 iexplore.exe 84 PID 2300 wrote to memory of 1876 2300 iexplore.exe 86 PID 2300 wrote to memory of 1876 2300 iexplore.exe 86 PID 2300 wrote to memory of 1876 2300 iexplore.exe 86 PID 1712 wrote to memory of 576 1712 iexplore.exe 88 PID 1712 wrote to memory of 576 1712 iexplore.exe 88 PID 1712 wrote to memory of 576 1712 iexplore.exe 88 PID 1036 wrote to memory of 2276 1036 iexplore.exe 90 PID 1036 wrote to memory of 2276 1036 iexplore.exe 90 PID 1036 wrote to memory of 2276 1036 iexplore.exe 90 PID 2472 wrote to memory of 4080 2472 iexplore.exe 92 PID 2472 wrote to memory of 4080 2472 iexplore.exe 92 PID 2472 wrote to memory of 4080 2472 iexplore.exe 92 PID 3192 wrote to memory of 3528 3192 iexplore.exe 94 PID 3192 wrote to memory of 3528 3192 iexplore.exe 94 PID 3192 wrote to memory of 3528 3192 iexplore.exe 94 PID 3580 wrote to memory of 1308 3580 iexplore.exe 96 PID 3580 wrote to memory of 1308 3580 iexplore.exe 96 PID 3580 wrote to memory of 1308 3580 iexplore.exe 96 PID 1044 wrote to memory of 1032 1044 iexplore.exe 98 PID 1044 wrote to memory of 1032 1044 iexplore.exe 98 PID 1044 wrote to memory of 1032 1044 iexplore.exe 98 PID 3936 wrote to memory of 2028 3936 iexplore.exe 100 PID 3936 wrote to memory of 2028 3936 iexplore.exe 100 PID 3936 wrote to memory of 2028 3936 iexplore.exe 100 PID 2940 wrote to memory of 928 2940 iexplore.exe 102 PID 2940 wrote to memory of 928 2940 iexplore.exe 102 PID 2940 wrote to memory of 928 2940 iexplore.exe 102 PID 3700 wrote to memory of 3160 3700 iexplore.exe 104 PID 3700 wrote to memory of 3160 3700 iexplore.exe 104 PID 3700 wrote to memory of 3160 3700 iexplore.exe 104 PID 2868 wrote to memory of 996 2868 iexplore.exe 106 PID 2868 wrote to memory of 996 2868 iexplore.exe 106 PID 2868 wrote to memory of 996 2868 iexplore.exe 106 PID 3944 wrote to memory of 3848 3944 iexplore.exe 108 PID 3944 wrote to memory of 3848 3944 iexplore.exe 108 PID 3944 wrote to memory of 3848 3944 iexplore.exe 108 PID 1912 wrote to memory of 2640 1912 iexplore.exe 110 PID 1912 wrote to memory of 2640 1912 iexplore.exe 110 PID 1912 wrote to memory of 2640 1912 iexplore.exe 110 PID 3016 wrote to memory of 2300 3016 iexplore.exe 112 PID 3016 wrote to memory of 2300 3016 iexplore.exe 112 PID 3016 wrote to memory of 2300 3016 iexplore.exe 112 PID 2372 wrote to memory of 3988 2372 iexplore.exe 114 PID 2372 wrote to memory of 3988 2372 iexplore.exe 114 PID 2372 wrote to memory of 3988 2372 iexplore.exe 114 PID 964 wrote to memory of 2132 964 iexplore.exe 116 PID 964 wrote to memory of 2132 964 iexplore.exe 116 PID 964 wrote to memory of 2132 964 iexplore.exe 116 PID 508 wrote to memory of 2272 508 iexplore.exe 118 PID 508 wrote to memory of 2272 508 iexplore.exe 118 PID 508 wrote to memory of 2272 508 iexplore.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de81647d41ef9c982920e119ebaf27b5affcf26.exe"C:\Users\Admin\AppData\Local\Temp\7de81647d41ef9c982920e119ebaf27b5affcf26.exe"1⤵PID:664
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3236 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:424 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1036 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:2276
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:4080
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3192 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:3528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3580 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3936 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:2028
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2940 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3700 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:3160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3944 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:3848
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1912 CREDAT:82945 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:82945 /prefetch:22⤵PID:3988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:2132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:508 CREDAT:82945 /prefetch:22⤵PID:2272
-