Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:51
Behavioral task
behavioral1
Sample
2ac542b9da647699c8fc8c20405500d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ac542b9da647699c8fc8c20405500d1.exe
Resource
win10v2004-20231215-en
General
-
Target
2ac542b9da647699c8fc8c20405500d1.exe
-
Size
80KB
-
MD5
2ac542b9da647699c8fc8c20405500d1
-
SHA1
a2d9c98b73f9a40c722569aab683b8997acf3e36
-
SHA256
6ad57d1038b1e4db9ea3755aa77d9fe780440c40098c2b9b2bf77229d62c64f8
-
SHA512
a210b1f2596a644faf0d467f310cac3dd6c8089d98dc016cf58d15152a25958fcb9cddc86d98c4408f34c19e388336120f921b020dbc554f5fb5cfcf3d5c306d
-
SSDEEP
768:52NtaxVWZKrTM+1Z6/25l6FxD90My9625y1uRpAo3X53MPWELTb5SQSgj8+kudKv:5ZVW2ToLXm/6q9ELH5SQPiQKyhQxgy
Malware Config
Signatures
-
Executes dropped EXE 28 IoCs
pid Process 2532 explorer.exe 2808 explorer.exe 2724 explorer.exe 2952 explorer.exe 2656 explorer.exe 1276 explorer.exe 752 explorer.exe 2908 explorer.exe 1684 smss.exe 1800 explorer.exe 1808 smss.exe 2264 explorer.exe 704 smss.exe 620 explorer.exe 2348 explorer.exe 1188 explorer.exe 2480 smss.exe 2688 explorer.exe 1484 explorer.exe 2468 explorer.exe 1136 explorer.exe 2380 smss.exe 2196 explorer.exe 2260 explorer.exe 2440 explorer.exe 1376 explorer.exe 2520 smss.exe 1032 explorer.exe -
Loads dropped DLL 57 IoCs
pid Process 2040 2ac542b9da647699c8fc8c20405500d1.exe 2040 2ac542b9da647699c8fc8c20405500d1.exe 2532 explorer.exe 2532 explorer.exe 2808 explorer.exe 2808 explorer.exe 2724 explorer.exe 2724 explorer.exe 2952 explorer.exe 2952 explorer.exe 2656 explorer.exe 2656 explorer.exe 1276 explorer.exe 1276 explorer.exe 752 explorer.exe 752 explorer.exe 2040 2ac542b9da647699c8fc8c20405500d1.exe 2040 2ac542b9da647699c8fc8c20405500d1.exe 2908 explorer.exe 2908 explorer.exe 2532 explorer.exe 2532 explorer.exe 1684 smss.exe 1684 smss.exe 2808 explorer.exe 2808 explorer.exe 1800 explorer.exe 1800 explorer.exe 1808 smss.exe 1808 smss.exe 2264 explorer.exe 2264 explorer.exe 2724 explorer.exe 2724 explorer.exe 704 smss.exe 704 smss.exe 620 explorer.exe 620 explorer.exe 2348 explorer.exe 2348 explorer.exe 1188 explorer.exe 1188 explorer.exe 2952 explorer.exe 2952 explorer.exe 2480 smss.exe 2480 smss.exe 2688 explorer.exe 2688 explorer.exe 1484 explorer.exe 1484 explorer.exe 2468 explorer.exe 2468 explorer.exe 2656 explorer.exe 1136 explorer.exe 2656 explorer.exe 1136 explorer.exe 2380 smss.exe -
resource yara_rule behavioral1/memory/2040-0-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/files/0x0032000000015c4c-10.dat upx behavioral1/memory/2532-12-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2040-9-0x0000000000310000-0x0000000000368000-memory.dmp upx behavioral1/memory/2808-19-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2724-26-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/files/0x0032000000015c4c-23.dat upx behavioral1/memory/2532-28-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2040-27-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2952-35-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2808-36-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2656-42-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2724-43-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/files/0x000b000000015c75-45.dat upx behavioral1/memory/1276-52-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2952-53-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/752-60-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2656-61-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2908-68-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1684-77-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1276-76-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2040-71-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/752-86-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1808-87-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2264-92-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1684-90-0x0000000000290000-0x00000000002E8000-memory.dmp upx behavioral1/memory/2908-94-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/704-100-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/files/0x000e000000015c75-96.dat upx behavioral1/files/0x000e000000015c75-95.dat upx behavioral1/memory/620-106-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1684-105-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/files/0x0032000000015c4c-103.dat upx behavioral1/memory/1800-116-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1808-118-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1188-117-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2532-111-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2480-124-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2264-123-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2688-129-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1484-132-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/704-131-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2808-133-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2468-137-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/620-136-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1136-141-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2380-144-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2348-143-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2196-147-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1188-145-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2260-154-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2440-156-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2480-155-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2724-149-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1376-158-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1032-165-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2520-164-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2688-163-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1148-169-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1484-167-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2952-170-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1696-173-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2468-172-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1988-179-0x0000000000400000-0x0000000000458000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: smss.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\e: smss.exe File opened (read-only) \??\u: smss.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\x: smss.exe File opened (read-only) \??\v: smss.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\t: explorer.exe File opened (read-only) \??\k: 2ac542b9da647699c8fc8c20405500d1.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\s: smss.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\o: smss.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\w: smss.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\r: 2ac542b9da647699c8fc8c20405500d1.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\y: smss.exe File opened (read-only) \??\k: smss.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\s: smss.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\y: smss.exe File opened (read-only) \??\v: smss.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\w: smss.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\y: 2ac542b9da647699c8fc8c20405500d1.exe File opened (read-only) \??\v: smss.exe File opened (read-only) \??\l: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\h: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\v: smss.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\g: smss.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\j: explorer.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\v: smss.exe File opened (read-only) \??\w: smss.exe File opened (read-only) \??\o: explorer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe smss.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe smss.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe 2ac542b9da647699c8fc8c20405500d1.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe 2ac542b9da647699c8fc8c20405500d1.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe smss.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe smss.exe File opened for modification C:\Windows\SysWOW64\scsjfmvmqv\smss.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe File created C:\Windows\SysWOW64\xarxxhvurc\explorer.exe explorer.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2040 2ac542b9da647699c8fc8c20405500d1.exe 2532 explorer.exe 2808 explorer.exe 2724 explorer.exe 2952 explorer.exe 2656 explorer.exe 1276 explorer.exe 752 explorer.exe 2908 explorer.exe 1684 smss.exe 1800 explorer.exe 1808 smss.exe 2264 explorer.exe 704 smss.exe 620 explorer.exe 2348 explorer.exe 1188 explorer.exe 2480 smss.exe 2688 explorer.exe 1484 explorer.exe 2468 explorer.exe 1136 explorer.exe 2380 smss.exe 2196 explorer.exe 2260 explorer.exe 2440 explorer.exe 1376 explorer.exe 2520 smss.exe 1032 explorer.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeLoadDriverPrivilege 2040 2ac542b9da647699c8fc8c20405500d1.exe Token: SeLoadDriverPrivilege 2532 explorer.exe Token: SeLoadDriverPrivilege 2808 explorer.exe Token: SeLoadDriverPrivilege 2724 explorer.exe Token: SeLoadDriverPrivilege 2952 explorer.exe Token: SeLoadDriverPrivilege 2656 explorer.exe Token: SeLoadDriverPrivilege 1276 explorer.exe Token: SeLoadDriverPrivilege 752 explorer.exe Token: SeLoadDriverPrivilege 2908 explorer.exe Token: SeLoadDriverPrivilege 1684 smss.exe Token: SeLoadDriverPrivilege 1800 explorer.exe Token: SeLoadDriverPrivilege 1808 smss.exe Token: SeLoadDriverPrivilege 2264 explorer.exe Token: SeLoadDriverPrivilege 704 smss.exe Token: SeLoadDriverPrivilege 620 explorer.exe Token: SeLoadDriverPrivilege 2348 explorer.exe Token: SeLoadDriverPrivilege 1188 explorer.exe Token: SeLoadDriverPrivilege 2480 smss.exe Token: SeLoadDriverPrivilege 2688 explorer.exe Token: SeLoadDriverPrivilege 1484 explorer.exe Token: SeLoadDriverPrivilege 2468 explorer.exe Token: SeLoadDriverPrivilege 1136 explorer.exe Token: SeLoadDriverPrivilege 2380 smss.exe Token: SeLoadDriverPrivilege 2196 explorer.exe Token: SeLoadDriverPrivilege 2260 explorer.exe Token: SeLoadDriverPrivilege 2440 explorer.exe Token: SeLoadDriverPrivilege 1376 explorer.exe Token: SeLoadDriverPrivilege 2520 smss.exe Token: SeLoadDriverPrivilege 1032 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2532 2040 2ac542b9da647699c8fc8c20405500d1.exe 28 PID 2040 wrote to memory of 2532 2040 2ac542b9da647699c8fc8c20405500d1.exe 28 PID 2040 wrote to memory of 2532 2040 2ac542b9da647699c8fc8c20405500d1.exe 28 PID 2040 wrote to memory of 2532 2040 2ac542b9da647699c8fc8c20405500d1.exe 28 PID 2532 wrote to memory of 2808 2532 explorer.exe 29 PID 2532 wrote to memory of 2808 2532 explorer.exe 29 PID 2532 wrote to memory of 2808 2532 explorer.exe 29 PID 2532 wrote to memory of 2808 2532 explorer.exe 29 PID 2808 wrote to memory of 2724 2808 explorer.exe 30 PID 2808 wrote to memory of 2724 2808 explorer.exe 30 PID 2808 wrote to memory of 2724 2808 explorer.exe 30 PID 2808 wrote to memory of 2724 2808 explorer.exe 30 PID 2724 wrote to memory of 2952 2724 explorer.exe 31 PID 2724 wrote to memory of 2952 2724 explorer.exe 31 PID 2724 wrote to memory of 2952 2724 explorer.exe 31 PID 2724 wrote to memory of 2952 2724 explorer.exe 31 PID 2952 wrote to memory of 2656 2952 explorer.exe 32 PID 2952 wrote to memory of 2656 2952 explorer.exe 32 PID 2952 wrote to memory of 2656 2952 explorer.exe 32 PID 2952 wrote to memory of 2656 2952 explorer.exe 32 PID 2656 wrote to memory of 1276 2656 explorer.exe 33 PID 2656 wrote to memory of 1276 2656 explorer.exe 33 PID 2656 wrote to memory of 1276 2656 explorer.exe 33 PID 2656 wrote to memory of 1276 2656 explorer.exe 33 PID 1276 wrote to memory of 752 1276 explorer.exe 34 PID 1276 wrote to memory of 752 1276 explorer.exe 34 PID 1276 wrote to memory of 752 1276 explorer.exe 34 PID 1276 wrote to memory of 752 1276 explorer.exe 34 PID 752 wrote to memory of 2908 752 explorer.exe 35 PID 752 wrote to memory of 2908 752 explorer.exe 35 PID 752 wrote to memory of 2908 752 explorer.exe 35 PID 752 wrote to memory of 2908 752 explorer.exe 35 PID 2040 wrote to memory of 1684 2040 2ac542b9da647699c8fc8c20405500d1.exe 36 PID 2040 wrote to memory of 1684 2040 2ac542b9da647699c8fc8c20405500d1.exe 36 PID 2040 wrote to memory of 1684 2040 2ac542b9da647699c8fc8c20405500d1.exe 36 PID 2040 wrote to memory of 1684 2040 2ac542b9da647699c8fc8c20405500d1.exe 36 PID 2908 wrote to memory of 1800 2908 explorer.exe 37 PID 2908 wrote to memory of 1800 2908 explorer.exe 37 PID 2908 wrote to memory of 1800 2908 explorer.exe 37 PID 2908 wrote to memory of 1800 2908 explorer.exe 37 PID 2532 wrote to memory of 1808 2532 explorer.exe 38 PID 2532 wrote to memory of 1808 2532 explorer.exe 38 PID 2532 wrote to memory of 1808 2532 explorer.exe 38 PID 2532 wrote to memory of 1808 2532 explorer.exe 38 PID 1684 wrote to memory of 2264 1684 smss.exe 39 PID 1684 wrote to memory of 2264 1684 smss.exe 39 PID 1684 wrote to memory of 2264 1684 smss.exe 39 PID 1684 wrote to memory of 2264 1684 smss.exe 39 PID 2808 wrote to memory of 704 2808 explorer.exe 42 PID 2808 wrote to memory of 704 2808 explorer.exe 42 PID 2808 wrote to memory of 704 2808 explorer.exe 42 PID 2808 wrote to memory of 704 2808 explorer.exe 42 PID 1800 wrote to memory of 620 1800 explorer.exe 43 PID 1800 wrote to memory of 620 1800 explorer.exe 43 PID 1800 wrote to memory of 620 1800 explorer.exe 43 PID 1800 wrote to memory of 620 1800 explorer.exe 43 PID 1808 wrote to memory of 2348 1808 smss.exe 44 PID 1808 wrote to memory of 2348 1808 smss.exe 44 PID 1808 wrote to memory of 2348 1808 smss.exe 44 PID 1808 wrote to memory of 2348 1808 smss.exe 44 PID 2264 wrote to memory of 1188 2264 explorer.exe 45 PID 2264 wrote to memory of 1188 2264 explorer.exe 45 PID 2264 wrote to memory of 1188 2264 explorer.exe 45 PID 2264 wrote to memory of 1188 2264 explorer.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ac542b9da647699c8fc8c20405500d1.exe"C:\Users\Admin\AppData\Local\Temp\2ac542b9da647699c8fc8c20405500d1.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:2392
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3068
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:1832
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:924
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe18⤵PID:2504
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe19⤵PID:772
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe20⤵PID:3536
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe21⤵PID:3384
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe22⤵PID:4256
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe19⤵PID:2100
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe18⤵PID:5204
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe17⤵PID:4640
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe18⤵PID:5480
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe16⤵PID:4092
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:4944
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe18⤵PID:2840
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe15⤵PID:3124
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:4160
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:2928
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe14⤵PID:3252
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3760
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:4820
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:5180
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:2300
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3268
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:1996
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:4780
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:5352
-
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:2920
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:2400
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3280
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:2884
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:4980
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:6928
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:5308
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:1600
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:876
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:1640
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3300
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3524
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:5040
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:5864
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:5300
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5160
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:1720
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:1532
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:1568
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:1248
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3460
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3632
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:4396
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:5336
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5196
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:4624
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2996
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:2816
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:2940
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:1780
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2896
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:1864
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3292
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3144
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:4952
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe17⤵PID:1876
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:5312
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5148
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:4612
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:5440
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:4056
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:4960
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:6328
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:2224
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:2764
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:872
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:2536
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2328
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:2964
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3716
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3788
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:2264
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:5628
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5456
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:4880
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:5544
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:2976
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:4360
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:3440
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4340
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:6060
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe7⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:1580
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:2664
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:3032
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:3036
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:572
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:2056
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3976
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:4492
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:6068
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5740
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:4172
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:6972
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:3480
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:2092
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:3660
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4676
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:5216
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:3592
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:3472
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:5032
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:1624
-
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:1148
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:2684
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:1596
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:576
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:3000
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2160
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:2028
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3104
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:4536
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:6048
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:1048
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5788
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:4596
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:4268
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:2444
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:3992
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4724
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:5364
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:3772
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:3644
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4856
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe7⤵PID:2924
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3996
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4500
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:5820
-
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:1696
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:1636
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:2912
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:1812
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:2596
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2724
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:2180
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:2132
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:4796
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe16⤵PID:5516
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:2616
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5800
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:4900
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:4420
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:2680
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:3392
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4732
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:5280
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:3916
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:3612
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4560
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe7⤵PID:1496
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3352
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4716
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:980
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:1672
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:1448
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:1276
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4804
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:5144
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:1988
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3016
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:1804
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:2488
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:1604
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2272
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:3528
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:3380
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:3944
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:1056
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:5168
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:4600
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:5504
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:3752
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4936
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:6292
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:2020
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4124
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4404
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe7⤵PID:3240
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3796
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4788
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:5328
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:2012
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3212
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3120
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4812
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:840
-
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵PID:1116
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵PID:2916
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3200
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3176
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4992
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:6276
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:5256
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:1444
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:2968
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:1048
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:1336
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:1820
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:368
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:3700
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:4140
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:4412
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:5620
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:5464
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:4864
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:5528
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:4048
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:4332
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:3412
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4316
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:5832
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe7⤵PID:3404
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3428
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:5008
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:6264
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:2648
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3544
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4108
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4384
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵PID:1612
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵PID:2660
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3652
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4116
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4552
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:5604
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe4⤵PID:2988
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵PID:3020
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵PID:2752
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3692
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4132
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4352
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:5636
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵PID:5448
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1136 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032 -
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:1592
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:2668
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:2032
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:2788
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:1692
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe12⤵PID:2600
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe13⤵PID:3952
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe14⤵PID:4508
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe15⤵PID:6088
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe13⤵PID:1284
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe12⤵PID:6744
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe11⤵PID:5764
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe10⤵PID:4196
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe11⤵PID:3736
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe9⤵PID:3940
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:3688
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe8⤵PID:3748
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4580
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:1020
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe7⤵PID:3580
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:3456
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:5000
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe10⤵PID:2492
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:880
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3896
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4152
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:4232
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵PID:860
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵PID:2944
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3984
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4544
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:1044
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:6800
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe4⤵PID:1688
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵PID:2808
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵PID:2812
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3968
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4520
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:5812
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe6⤵PID:6680
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵PID:5748
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe3⤵PID:3012
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe4⤵PID:1680
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵PID:1872
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe6⤵PID:3024
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe7⤵PID:3960
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe8⤵PID:4528
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe9⤵PID:6080
-
-
-
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe5⤵PID:5756
-
-
-
C:\Windows\SysWOW64\scsjfmvmqv\smss.exeC:\Windows\system32\scsjfmvmqv\smss.exe4⤵PID:1684
-
C:\Windows\SysWOW64\xarxxhvurc\explorer.exeC:\Windows\system32\xarxxhvurc\explorer.exe5⤵PID:2360
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56aa2e845a445c1c88ae4b7422b1a4bcf
SHA1462d43e08dbdefc6003d4660874dc1bd9f36f07c
SHA256e4ff1e66b68bc8072e37c90a8f9baa1de597b4565843bccdbc3c5747a0faa462
SHA51281152375017b964beb251b4ad6dee9cc5e4efc09f628b20f7ca662fb750285d1cceb0b6bb2f6836d6bcce397047857e63f779f556d10b04c4cfe97b42b80cb91
-
Filesize
80KB
MD52ac542b9da647699c8fc8c20405500d1
SHA1a2d9c98b73f9a40c722569aab683b8997acf3e36
SHA2566ad57d1038b1e4db9ea3755aa77d9fe780440c40098c2b9b2bf77229d62c64f8
SHA512a210b1f2596a644faf0d467f310cac3dd6c8089d98dc016cf58d15152a25958fcb9cddc86d98c4408f34c19e388336120f921b020dbc554f5fb5cfcf3d5c306d
-
Filesize
12KB
MD53cff72e43a2463f840a643358b24385f
SHA1a158e8c24e24f89ae2674d11b756d0707a606a04
SHA25658eb9388fafbf365c83cb245166d6d9c83ca96ae73995b964c6b2148bd63fb9d
SHA512ee06b733bf3113f1dbd6ffa9358e7f35d2448a72f84c00c1830944204617ea931f27673818520983d84a25eb30313f801637df5ed46aa1952d5294d00ee4255b
-
Filesize
37KB
MD5093104381c036faf78aaae3552da2c9b
SHA1a7e28f0368b9fd9f04c0af0526cebd3b3e807138
SHA256f1de5d4f4156940d72351855e8ebe6068384172f427a3cec1b27c45493ed29b9
SHA512f36cb682c4392a345d8de34fb1c4183cde55fbaac845aeaf21833d036fe3b846190d7bf0b4f3bf7986677943f01c8c0be76fe2d777a32a18f863d5213462ab22
-
Filesize
16KB
MD567fc13deac873123a3155477694f1f14
SHA15e17a28045e5878943ec5c67d0afcc5e28f59b0c
SHA2566b9a5f1cd0950b3aeb2cd7262606265eeb22cae29515d54b3cf45e90e3d978d7
SHA5128f8524fe5decbcd369af32d5fffa1aec302eb9949142b9544e7dc63edded6b79d112c3949995ee58b70405843e78cd7887f38ac952461ddd512571a0b9ebe25e
-
Filesize
63KB
MD510bd9f081c7b2131c43c3f1ed530ae32
SHA11971d4006907924f9fb6df707b633709b148ea81
SHA2560a61e8ff98fb8456d3af755526108486cf0bb2d0c1e001db4b3034ff572cca35
SHA512fd719b606bdbb55185c9718697ff3662bf60793014412a6e91265a890580bf63d5eac2a5b9428fd5bf316f974e7e3e2b8115425680610b44be53a9dc7f6f5984