Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe
Resource
win7-20240708-en
General
-
Target
af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe
-
Size
6.0MB
-
MD5
3943063d8a8fb69b50caf1acfead34ee
-
SHA1
25b565a954aa0810ab4472004d30bc4792e1e5f5
-
SHA256
af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b
-
SHA512
c690729792cccbda50457d47ba204359fbd4fa6117c47b0169a0aa41c555d2e21ba293458c7ed407c048536b823e0ec959d31128bb4b0c3e6b9208a6e768610f
-
SSDEEP
98304:c+6ehmwOFcFki+TQlF3Knk7cgEx2fI6y8ZKmQiTVvtH6+25obrcs1028:c+lQwmPiOG3H33I6ypWTVvtaNy228
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
HID.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HID.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
HID.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HID.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate HID.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeaf27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HID.exe -
Drops startup file 64 IoCs
Processes:
explorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ufr_reports explorer.exe -
Executes dropped EXE 64 IoCs
Processes:
HID.exeHID.exesvchost.comexplorer.exesvchost.comHID.exeexplorer.exesvchost.comHID.exesvchost.comexplorer.exeexplorer.exesvchost.comHID.exesvchost.comHID.exesvchost.comsvchost.comHID.exeexplorer.exeexplorer.exesvchost.comHID.exesvchost.comsvchost.comexplorer.exeHID.exeexplorer.exesvchost.comHID.exesvchost.comsvchost.comexplorer.exeHID.exeexplorer.exesvchost.comHID.exesvchost.comexplorer.exeexplorer.exesvchost.comHID.exesvchost.comHID.exesvchost.comexplorer.exeexplorer.exesvchost.comHID.exesvchost.comHID.exesvchost.comexplorer.exesvchost.comHID.exeexplorer.exesvchost.comHID.exesvchost.comsvchost.comexplorer.exeHID.exeexplorer.exesvchost.compid Process 1908 HID.exe 2708 HID.exe 5068 svchost.com 1808 explorer.exe 3612 svchost.com 3152 HID.exe 440 explorer.exe 1964 svchost.com 3276 HID.exe 3284 svchost.com 2324 explorer.exe 5048 explorer.exe 2780 svchost.com 2860 HID.exe 3088 svchost.com 4384 HID.exe 1048 svchost.com 2120 svchost.com 3800 HID.exe 4712 explorer.exe 4036 explorer.exe 3176 svchost.com 4488 HID.exe 1164 svchost.com 4392 svchost.com 2304 explorer.exe 1316 HID.exe 4856 explorer.exe 4988 svchost.com 4228 HID.exe 1716 svchost.com 3300 svchost.com 5108 explorer.exe 4164 HID.exe 3608 explorer.exe 4744 svchost.com 2288 HID.exe 4544 svchost.com 3860 explorer.exe 708 explorer.exe 2624 svchost.com 3456 HID.exe 1472 svchost.com 1476 HID.exe 2556 svchost.com 3692 explorer.exe 3056 explorer.exe 1428 svchost.com 3292 HID.exe 5032 svchost.com 448 HID.exe 1732 svchost.com 4748 explorer.exe 2992 svchost.com 2672 HID.exe 4276 explorer.exe 1604 svchost.com 3016 HID.exe 2708 svchost.com 696 svchost.com 2356 explorer.exe 552 HID.exe 3280 explorer.exe 5024 svchost.com -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
HID.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine HID.exe -
Loads dropped DLL 1 IoCs
Processes:
HID.exepid Process 4476 HID.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
HID.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" HID.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
HID.exepid Process 4476 HID.exe -
Drops file in Program Files directory 64 IoCs
Processes:
HID.exesvchost.comdescription ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE HID.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE HID.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE HID.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE HID.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE HID.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe HID.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE HID.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe HID.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe HID.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE HID.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe HID.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE HID.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE HID.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe HID.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE HID.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe HID.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe HID.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE HID.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe HID.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE HID.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe HID.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe HID.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE HID.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe HID.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe HID.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe HID.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE HID.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE HID.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE HID.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe HID.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe HID.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe HID.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE HID.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE HID.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe HID.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHID.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHID.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHID.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHID.exesvchost.comsvchost.comsvchost.comHID.exesvchost.comHID.exesvchost.comsvchost.comHID.exeHID.exesvchost.comsvchost.comHID.exeHID.exeHID.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHID.exedescription ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HID.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys HID.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys HID.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HID.exe File opened for modification C:\Windows\directx.sys HID.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HID.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys HID.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.comsvchost.comexplorer.exesvchost.comHID.exeexplorer.exeexplorer.exeHID.exeHID.exeHID.exesvchost.comexplorer.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHID.exeHID.exeexplorer.exeHID.exesvchost.comsvchost.comHID.exesvchost.comsvchost.comexplorer.exesvchost.comsvchost.comsvchost.comexplorer.exesvchost.comHID.exeexplorer.exeexplorer.exeHID.exeexplorer.exeHID.exeHID.exeHID.exeHID.exeHID.exesvchost.comHID.exesvchost.comexplorer.exesvchost.comsvchost.comexplorer.exesvchost.comsvchost.comexplorer.exesvchost.comsvchost.comHID.exesvchost.comexplorer.exesvchost.comHID.exeHID.exesvchost.comexplorer.exeHID.exeHID.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HID.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
HID.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CentralProcessor\0\ HID.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HID.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
HID.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\BIOS\ HID.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct HID.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\ HID.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate HID.exe -
Modifies registry class 64 IoCs
Processes:
HID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exeHID.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings HID.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
HID.exepid Process 4476 HID.exe 4476 HID.exe 4476 HID.exe 4476 HID.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
HID.exedescription pid Process Token: SeDebugPrivilege 4476 HID.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
HID.exepid Process 4476 HID.exe 4476 HID.exe 4476 HID.exe 4476 HID.exe 4476 HID.exe 4476 HID.exe 4476 HID.exe 4476 HID.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exeHID.exeHID.exesvchost.comsvchost.comexplorer.exeHID.exesvchost.comHID.exesvchost.comexplorer.exesvchost.comHID.exesvchost.comHID.exesvchost.comsvchost.comexplorer.exeHID.exedescription pid Process procid_target PID 4944 wrote to memory of 1908 4944 af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe 87 PID 4944 wrote to memory of 1908 4944 af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe 87 PID 4944 wrote to memory of 1908 4944 af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe 87 PID 1908 wrote to memory of 2708 1908 HID.exe 88 PID 1908 wrote to memory of 2708 1908 HID.exe 88 PID 1908 wrote to memory of 2708 1908 HID.exe 88 PID 2708 wrote to memory of 5068 2708 HID.exe 89 PID 2708 wrote to memory of 5068 2708 HID.exe 89 PID 2708 wrote to memory of 5068 2708 HID.exe 89 PID 5068 wrote to memory of 1808 5068 svchost.com 90 PID 5068 wrote to memory of 1808 5068 svchost.com 90 PID 5068 wrote to memory of 1808 5068 svchost.com 90 PID 2708 wrote to memory of 3612 2708 HID.exe 91 PID 2708 wrote to memory of 3612 2708 HID.exe 91 PID 2708 wrote to memory of 3612 2708 HID.exe 91 PID 3612 wrote to memory of 3152 3612 svchost.com 92 PID 3612 wrote to memory of 3152 3612 svchost.com 92 PID 3612 wrote to memory of 3152 3612 svchost.com 92 PID 1808 wrote to memory of 440 1808 explorer.exe 93 PID 1808 wrote to memory of 440 1808 explorer.exe 93 PID 1808 wrote to memory of 440 1808 explorer.exe 93 PID 3152 wrote to memory of 1964 3152 HID.exe 94 PID 3152 wrote to memory of 1964 3152 HID.exe 94 PID 3152 wrote to memory of 1964 3152 HID.exe 94 PID 1964 wrote to memory of 3276 1964 svchost.com 95 PID 1964 wrote to memory of 3276 1964 svchost.com 95 PID 1964 wrote to memory of 3276 1964 svchost.com 95 PID 3276 wrote to memory of 3284 3276 HID.exe 96 PID 3276 wrote to memory of 3284 3276 HID.exe 96 PID 3276 wrote to memory of 3284 3276 HID.exe 96 PID 3284 wrote to memory of 2324 3284 svchost.com 97 PID 3284 wrote to memory of 2324 3284 svchost.com 97 PID 3284 wrote to memory of 2324 3284 svchost.com 97 PID 2324 wrote to memory of 5048 2324 explorer.exe 98 PID 2324 wrote to memory of 5048 2324 explorer.exe 98 PID 2324 wrote to memory of 5048 2324 explorer.exe 98 PID 3276 wrote to memory of 2780 3276 HID.exe 99 PID 3276 wrote to memory of 2780 3276 HID.exe 99 PID 3276 wrote to memory of 2780 3276 HID.exe 99 PID 2780 wrote to memory of 2860 2780 svchost.com 100 PID 2780 wrote to memory of 2860 2780 svchost.com 100 PID 2780 wrote to memory of 2860 2780 svchost.com 100 PID 2860 wrote to memory of 3088 2860 HID.exe 101 PID 2860 wrote to memory of 3088 2860 HID.exe 101 PID 2860 wrote to memory of 3088 2860 HID.exe 101 PID 3088 wrote to memory of 4384 3088 svchost.com 202 PID 3088 wrote to memory of 4384 3088 svchost.com 202 PID 3088 wrote to memory of 4384 3088 svchost.com 202 PID 4384 wrote to memory of 1048 4384 HID.exe 169 PID 4384 wrote to memory of 1048 4384 HID.exe 169 PID 4384 wrote to memory of 1048 4384 HID.exe 169 PID 4384 wrote to memory of 2120 4384 HID.exe 105 PID 4384 wrote to memory of 2120 4384 HID.exe 105 PID 4384 wrote to memory of 2120 4384 HID.exe 105 PID 1048 wrote to memory of 4712 1048 svchost.com 104 PID 1048 wrote to memory of 4712 1048 svchost.com 104 PID 1048 wrote to memory of 4712 1048 svchost.com 104 PID 2120 wrote to memory of 3800 2120 svchost.com 106 PID 2120 wrote to memory of 3800 2120 svchost.com 106 PID 2120 wrote to memory of 3800 2120 svchost.com 106 PID 4712 wrote to memory of 4036 4712 explorer.exe 107 PID 4712 wrote to memory of 4036 4712 explorer.exe 107 PID 4712 wrote to memory of 4036 4712 explorer.exe 107 PID 3800 wrote to memory of 3176 3800 HID.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe"C:\Users\Admin\AppData\Local\Temp\af27c5ab9e64db813ad6a8636af0462f5323eca30c67fef5d9f0a1e684658a9b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\HID.exe"C:\Users\Admin\AppData\Local\Temp\HID.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"6⤵
- Executes dropped EXE
PID:440
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe9⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"10⤵
- Executes dropped EXE
PID:5048
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe13⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"14⤵
- Executes dropped EXE
PID:4036
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"14⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe15⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"16⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe17⤵
- Drops startup file
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"18⤵
- Executes dropped EXE
PID:4856
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"16⤵
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe17⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"18⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"20⤵
- Executes dropped EXE
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe21⤵
- Drops startup file
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"22⤵
- Executes dropped EXE
PID:3608
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"20⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"22⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe25⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3860 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"26⤵
- Executes dropped EXE
PID:708
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"28⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe29⤵
- Drops startup file
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"30⤵
- Executes dropped EXE
PID:3056
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"28⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"30⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"32⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe33⤵
- Drops startup file
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"34⤵
- Executes dropped EXE
PID:4276
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"32⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe33⤵
- Checks computer location settings
- Executes dropped EXE
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe37⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"38⤵
- Drops startup file
- Executes dropped EXE
PID:3280
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"36⤵
- Executes dropped EXE
PID:696 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"38⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe39⤵
- Checks computer location settings
- Modifies registry class
PID:4700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"40⤵
- Drops file in Windows directory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe41⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"42⤵PID:3704
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"40⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe41⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"42⤵
- Drops file in Windows directory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe43⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"44⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe45⤵
- Drops startup file
PID:2340 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"46⤵PID:2964
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"44⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe45⤵PID:4516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"46⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe47⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"48⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe49⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"50⤵PID:4896
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"48⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe49⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"50⤵
- Drops file in Windows directory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe51⤵
- Checks computer location settings
- Modifies registry class
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"52⤵
- Drops file in Windows directory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe53⤵
- Drops startup file
PID:2908 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"54⤵PID:1392
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"52⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe53⤵
- Checks computer location settings
PID:4904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"54⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe55⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"56⤵
- Drops file in Windows directory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe57⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"58⤵PID:2784
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"56⤵
- Drops file in Windows directory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe57⤵
- Checks computer location settings
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"58⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe59⤵
- Checks computer location settings
- Modifies registry class
PID:3556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"60⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe61⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"62⤵PID:4468
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"60⤵
- Drops file in Windows directory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe61⤵
- Checks computer location settings
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"62⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe63⤵
- Checks computer location settings
- Modifies registry class
PID:3372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"64⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe65⤵
- Drops startup file
PID:3692 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"66⤵PID:2008
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"64⤵
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe65⤵
- Checks computer location settings
- Modifies registry class
PID:3872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"66⤵
- Drops file in Windows directory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe67⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"68⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe69⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"70⤵PID:4184
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"68⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe69⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"70⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe71⤵PID:2688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"72⤵
- Drops file in Windows directory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe73⤵
- Drops startup file
PID:3248 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"74⤵PID:2784
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"72⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe73⤵
- Checks computer location settings
- Modifies registry class
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"74⤵
- Drops file in Windows directory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe75⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"76⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe77⤵
- Drops startup file
PID:2616 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"78⤵
- Drops startup file
PID:2352
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"76⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe77⤵
- Drops file in Windows directory
- Modifies registry class
PID:1120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"78⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe79⤵
- Checks computer location settings
- Modifies registry class
PID:3660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"80⤵
- Drops file in Windows directory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe81⤵
- Drops startup file
PID:3160 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"82⤵PID:1812
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"80⤵
- Drops file in Windows directory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe81⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"82⤵
- System Location Discovery: System Language Discovery
PID:224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe83⤵
- Checks computer location settings
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"84⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe85⤵
- Drops startup file
PID:3252 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"86⤵PID:392
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"84⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe85⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"86⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe87⤵
- Checks computer location settings
- Modifies registry class
PID:3988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"88⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe89⤵
- Drops startup file
PID:1684 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"90⤵PID:2708
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"88⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe89⤵
- Checks computer location settings
- Modifies registry class
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"90⤵
- Drops file in Windows directory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe91⤵
- Checks computer location settings
- Modifies registry class
PID:900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"92⤵
- Drops file in Windows directory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe93⤵
- Drops startup file
PID:3200 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"94⤵PID:4816
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"92⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"94⤵
- Drops file in Windows directory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe95⤵
- Checks computer location settings
- Modifies registry class
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"96⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe97⤵
- Drops startup file
PID:2276 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"98⤵PID:5104
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"96⤵
- Drops file in Windows directory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe97⤵
- Checks computer location settings
- Modifies registry class
PID:3964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"98⤵
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe99⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"100⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe101⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"102⤵PID:1080
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"100⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe101⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"102⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe103⤵
- Modifies registry class
PID:3228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"104⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe105⤵
- Drops startup file
PID:716 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"106⤵PID:3924
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"104⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe105⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"106⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe107⤵
- Checks computer location settings
PID:1548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"108⤵
- Drops file in Windows directory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe109⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"110⤵PID:1920
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"108⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe109⤵
- Checks computer location settings
- Modifies registry class
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"110⤵
- Drops file in Windows directory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe111⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"112⤵
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe113⤵PID:5016
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"114⤵PID:1384
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"112⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe113⤵
- Modifies registry class
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"114⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe115⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"116⤵
- Drops file in Windows directory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe117⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"118⤵PID:440
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\HID.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\HID.exeC:\Users\Admin\AppData\Local\Temp\HID.exe117⤵
- Checks computer location settings
- Modifies registry class
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe"118⤵
- Drops file in Windows directory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HID.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HID.exe119⤵
- Checks computer location settings
- Modifies registry class
PID:4732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\explorer.exe"120⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\explorer.exeC:\Users\Admin\AppData\Local\Temp\explorer.exe121⤵
- Drops startup file
PID:1528 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe"122⤵PID:4700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-