Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:42
Behavioral task
behavioral1
Sample
Proxy.exe
Resource
win7-20240903-en
General
-
Target
Proxy.exe
-
Size
2.3MB
-
MD5
c2178d8b3bdcf1210181170012e95b83
-
SHA1
1a6e51b004c5384c0af7882229f6a949395d588a
-
SHA256
1d56622a3c6d280fc8d01051e201e6258265491d08ed387a4910d4663fb707a1
-
SHA512
c99ca875c22893d98bbb11fd70eacbad3e180e78f55abc9421db350db91c58428b52398678db0ccbfe9942ce9bf2775a61af9f1d709ca87c7f08c8b62c45fa5a
-
SSDEEP
24576:dFbkIsaPiXSVnC7Yp9zkNmZG8RRln4yzrIila8CfcX50Kew+IVWQPYwKBdzuyMrt:dREXSVMDi3w0aFIP+DwKnwhFltZ
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\Proxy.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/1628-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3984-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4776-83-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE family_neshta behavioral2/memory/5060-116-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Google\Update\DISABL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE family_neshta C:\PROGRA~2\MOZILL~1\UNINST~1.EXE family_neshta behavioral2/memory/3448-170-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE family_neshta C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE family_neshta C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE family_neshta C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\ONEDRI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{EF5AF~1\WINDOW~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{D87AE~1\WINDOW~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{63880~1\WINDOW~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE family_neshta C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE family_neshta behavioral2/memory/2496-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3788-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4852-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1924-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2480-236-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2444-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2184-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3384-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1060-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1388-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2512-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1968-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3972-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2032-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2592-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2600-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3592-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/664-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5088-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1856-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/916-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3152-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1448-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3684-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240628109.bat family_gh0strat -
Gh0strat family
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
look2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\svchcst\Parameters\ServiceDll = "C:\\Windows\\system32\\240628109.bat" look2.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HD_Proxy.exe -
Executes dropped EXE 64 IoCs
Processes:
Proxy.exelook2.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchcst.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exepid process 2756 Proxy.exe 2032 look2.exe 916 HD_Proxy.exe 1628 svchost.com 3984 HD_Proxy.exe 4776 svchost.com 5060 HD_Proxy.exe 3448 svchost.com 2496 HD_Proxy.exe 3788 svchost.com 4852 HD_Proxy.exe 1908 svchcst.exe 1924 svchost.com 2480 HD_Proxy.exe 2444 svchost.com 4508 HD_Proxy.exe 2184 svchost.com 3384 HD_Proxy.exe 1060 svchost.com 1388 HD_Proxy.exe 2512 svchost.com 1968 HD_Proxy.exe 3972 svchost.com 2032 HD_Proxy.exe 2592 svchost.com 2600 HD_Proxy.exe 3592 svchost.com 5088 HD_Proxy.exe 1856 svchost.com 3152 HD_Proxy.exe 1448 svchost.com 3684 HD_Proxy.exe 4156 svchost.com 1588 HD_Proxy.exe 2328 svchost.com 3488 HD_Proxy.exe 2596 svchost.com 1664 HD_Proxy.exe 2192 svchost.com 4332 HD_Proxy.exe 4908 svchost.com 2884 HD_Proxy.exe 1516 svchost.com 2216 HD_Proxy.exe 4504 svchost.com 4388 HD_Proxy.exe 1140 svchost.com 4452 HD_Proxy.exe 5112 svchost.com 2640 HD_Proxy.exe 3852 svchost.com 3492 HD_Proxy.exe 4364 svchost.com 4708 HD_Proxy.exe 112 svchost.com 1960 HD_Proxy.exe 3532 svchost.com 2236 HD_Proxy.exe 4156 svchost.com 4104 HD_Proxy.exe 4716 svchost.com 5020 HD_Proxy.exe 4836 svchost.com 3544 HD_Proxy.exe -
Loads dropped DLL 3 IoCs
Processes:
look2.exesvchost.exesvchcst.exepid process 2032 look2.exe 4632 svchost.exe 1908 svchcst.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
Proxy.exeHD_Proxy.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Proxy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" HD_Proxy.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 4 IoCs
Processes:
look2.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\240628109.bat look2.exe File opened for modification C:\Windows\SysWOW64\ini.ini look2.exe File created C:\Windows\SysWOW64\svchcst.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchcst.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Proxy.exeHD_Proxy.exeHD_Proxy.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe HD_Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe HD_Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe Proxy.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE Proxy.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe HD_Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Proxy.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe Proxy.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe Proxy.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE Proxy.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe HD_Proxy.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe Proxy.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comsvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\svchost.com HD_Proxy.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys HD_Proxy.exe File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
HD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comHD_Proxy.exesvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comsvchost.comHD_Proxy.exesvchost.comHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comHD_Proxy.exeHD_Proxy.exeHD_Proxy.exesvchost.comsvchost.comHD_Proxy.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_Proxy.exe -
Modifies registry class 64 IoCs
Processes:
HD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exeHD_Proxy.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_Proxy.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Proxy.exepid process 2756 Proxy.exe 2756 Proxy.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
Proxy.exeHD_Proxy.exepid process 2756 Proxy.exe 2756 Proxy.exe 3816 HD_Proxy.exe 3816 HD_Proxy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Proxy.exeProxy.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comsvchost.exeHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comHD_Proxy.exesvchost.comdescription pid process target process PID 664 wrote to memory of 2756 664 Proxy.exe Proxy.exe PID 664 wrote to memory of 2756 664 Proxy.exe Proxy.exe PID 664 wrote to memory of 2756 664 Proxy.exe Proxy.exe PID 2756 wrote to memory of 2032 2756 Proxy.exe look2.exe PID 2756 wrote to memory of 2032 2756 Proxy.exe look2.exe PID 2756 wrote to memory of 2032 2756 Proxy.exe look2.exe PID 2756 wrote to memory of 916 2756 Proxy.exe HD_Proxy.exe PID 2756 wrote to memory of 916 2756 Proxy.exe HD_Proxy.exe PID 2756 wrote to memory of 916 2756 Proxy.exe HD_Proxy.exe PID 916 wrote to memory of 1628 916 HD_Proxy.exe svchost.com PID 916 wrote to memory of 1628 916 HD_Proxy.exe svchost.com PID 916 wrote to memory of 1628 916 HD_Proxy.exe svchost.com PID 1628 wrote to memory of 3984 1628 svchost.com HD_Proxy.exe PID 1628 wrote to memory of 3984 1628 svchost.com HD_Proxy.exe PID 1628 wrote to memory of 3984 1628 svchost.com HD_Proxy.exe PID 3984 wrote to memory of 4776 3984 HD_Proxy.exe svchost.com PID 3984 wrote to memory of 4776 3984 HD_Proxy.exe svchost.com PID 3984 wrote to memory of 4776 3984 HD_Proxy.exe svchost.com PID 4776 wrote to memory of 5060 4776 svchost.com HD_Proxy.exe PID 4776 wrote to memory of 5060 4776 svchost.com HD_Proxy.exe PID 4776 wrote to memory of 5060 4776 svchost.com HD_Proxy.exe PID 5060 wrote to memory of 3448 5060 HD_Proxy.exe svchost.com PID 5060 wrote to memory of 3448 5060 HD_Proxy.exe svchost.com PID 5060 wrote to memory of 3448 5060 HD_Proxy.exe svchost.com PID 3448 wrote to memory of 2496 3448 svchost.com HD_Proxy.exe PID 3448 wrote to memory of 2496 3448 svchost.com HD_Proxy.exe PID 3448 wrote to memory of 2496 3448 svchost.com HD_Proxy.exe PID 2496 wrote to memory of 3788 2496 HD_Proxy.exe svchost.com PID 2496 wrote to memory of 3788 2496 HD_Proxy.exe svchost.com PID 2496 wrote to memory of 3788 2496 HD_Proxy.exe svchost.com PID 3788 wrote to memory of 4852 3788 svchost.com HD_Proxy.exe PID 3788 wrote to memory of 4852 3788 svchost.com HD_Proxy.exe PID 3788 wrote to memory of 4852 3788 svchost.com HD_Proxy.exe PID 4632 wrote to memory of 1908 4632 svchost.exe svchcst.exe PID 4632 wrote to memory of 1908 4632 svchost.exe svchcst.exe PID 4632 wrote to memory of 1908 4632 svchost.exe svchcst.exe PID 4852 wrote to memory of 1924 4852 HD_Proxy.exe svchost.com PID 4852 wrote to memory of 1924 4852 HD_Proxy.exe svchost.com PID 4852 wrote to memory of 1924 4852 HD_Proxy.exe svchost.com PID 1924 wrote to memory of 2480 1924 svchost.com HD_Proxy.exe PID 1924 wrote to memory of 2480 1924 svchost.com HD_Proxy.exe PID 1924 wrote to memory of 2480 1924 svchost.com HD_Proxy.exe PID 2480 wrote to memory of 2444 2480 HD_Proxy.exe svchost.com PID 2480 wrote to memory of 2444 2480 HD_Proxy.exe svchost.com PID 2480 wrote to memory of 2444 2480 HD_Proxy.exe svchost.com PID 2444 wrote to memory of 4508 2444 svchost.com HD_Proxy.exe PID 2444 wrote to memory of 4508 2444 svchost.com HD_Proxy.exe PID 2444 wrote to memory of 4508 2444 svchost.com HD_Proxy.exe PID 4508 wrote to memory of 2184 4508 HD_Proxy.exe svchost.com PID 4508 wrote to memory of 2184 4508 HD_Proxy.exe svchost.com PID 4508 wrote to memory of 2184 4508 HD_Proxy.exe svchost.com PID 2184 wrote to memory of 3384 2184 svchost.com HD_Proxy.exe PID 2184 wrote to memory of 3384 2184 svchost.com HD_Proxy.exe PID 2184 wrote to memory of 3384 2184 svchost.com HD_Proxy.exe PID 3384 wrote to memory of 1060 3384 HD_Proxy.exe svchost.com PID 3384 wrote to memory of 1060 3384 HD_Proxy.exe svchost.com PID 3384 wrote to memory of 1060 3384 HD_Proxy.exe svchost.com PID 1060 wrote to memory of 1388 1060 svchost.com HD_Proxy.exe PID 1060 wrote to memory of 1388 1060 svchost.com HD_Proxy.exe PID 1060 wrote to memory of 1388 1060 svchost.com HD_Proxy.exe PID 1388 wrote to memory of 2512 1388 HD_Proxy.exe svchost.com PID 1388 wrote to memory of 2512 1388 HD_Proxy.exe svchost.com PID 1388 wrote to memory of 2512 1388 HD_Proxy.exe svchost.com PID 2512 wrote to memory of 1968 2512 svchost.com HD_Proxy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proxy.exe"C:\Users\Admin\AppData\Local\Temp\Proxy.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Proxy.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\Proxy.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\look2.exeC:\Users\Admin\AppData\Local\Temp\\look2.exe3⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe7⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe21⤵
- Checks computer location settings
- Executes dropped EXE
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe23⤵
- Executes dropped EXE
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"26⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"28⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe29⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"30⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe31⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"32⤵
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"36⤵
- Executes dropped EXE
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"38⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"40⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"42⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"44⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"46⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"48⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"50⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"54⤵
- Executes dropped EXE
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe55⤵
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"56⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe59⤵
- Checks computer location settings
- Executes dropped EXE
PID:4104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"60⤵
- Executes dropped EXE
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"62⤵
- Executes dropped EXE
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"64⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe65⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"66⤵
- System Location Discovery: System Language Discovery
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe67⤵
- Drops file in Windows directory
- Modifies registry class
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"68⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe69⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"70⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe71⤵
- Drops file in Windows directory
- Modifies registry class
PID:456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"72⤵
- Drops file in Windows directory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe73⤵
- Drops file in Windows directory
PID:3852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"74⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe75⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"76⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe77⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"78⤵
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"80⤵
- Drops file in Windows directory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe81⤵
- Checks computer location settings
PID:3684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"82⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe83⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"84⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe85⤵
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"86⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe87⤵
- Checks computer location settings
PID:2936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"88⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe89⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"90⤵
- Drops file in Windows directory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe91⤵
- Checks computer location settings
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"92⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe93⤵
- Drops file in Windows directory
PID:3868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"94⤵
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe95⤵
- Checks computer location settings
- Modifies registry class
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"96⤵
- System Location Discovery: System Language Discovery
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe97⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"98⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe99⤵
- Checks computer location settings
- Drops file in Windows directory
PID:5044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"100⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe101⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"102⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe103⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"104⤵
- Drops file in Windows directory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe105⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"106⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe107⤵PID:2644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"108⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe109⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"110⤵
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe111⤵
- Checks computer location settings
- Modifies registry class
PID:5052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"112⤵
- Drops file in Windows directory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe113⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"114⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe115⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"116⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe117⤵
- Checks computer location settings
- Modifies registry class
PID:3808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"118⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe119⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"120⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exeC:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe121⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\HD_Proxy.exe"122⤵PID:4388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-