Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 21:12
Behavioral task
behavioral1
Sample
a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe
-
Size
359KB
-
MD5
a83a220af3d5851fce04ea753b2e5b0c
-
SHA1
7c55ce2b64097f72fa2dad694a0a62601c2f1917
-
SHA256
806bb04d260fa035ba3743451b59e454097ce87b104a6e877e3eeb5133174cf0
-
SHA512
40f5f60d96fddd922fd15ab718c125a8f0f0de51298de0f2033aba3a56e302ec5aaa4717cedbf18e9c0ff3a1ac5c89ca69980a72be0dddd4d4140d4a42a57f7e
-
SSDEEP
3072:OrMyBpL/+8SbNNZ1uUAjpL/7NMcpL/7ZI/pL/7HM8pL/7j+2BPXr:OrME/ZQfLuJ/d/6/P/1h
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1376 explorer.exe 2352 explorer.exe 2784 explorer.exe 2136 explorer.exe 2788 explorer.exe 2764 explorer.exe 2656 explorer.exe 2464 explorer.exe 1508 smss.exe 2932 explorer.exe 316 smss.exe 2692 explorer.exe 3000 smss.exe 1908 explorer.exe 1452 explorer.exe 1964 explorer.exe 2388 smss.exe 2108 explorer.exe 2084 explorer.exe 2604 explorer.exe 1876 explorer.exe 2212 smss.exe 2300 explorer.exe 1536 explorer.exe 936 explorer.exe 1552 explorer.exe 2276 explorer.exe 816 smss.exe 1648 explorer.exe 1980 explorer.exe 1276 explorer.exe 1708 explorer.exe 2484 explorer.exe 1020 smss.exe 2156 explorer.exe 2124 explorer.exe 1640 explorer.exe 2120 explorer.exe 2184 smss.exe 1888 explorer.exe 2224 explorer.exe 1440 explorer.exe 1968 explorer.exe 1528 explorer.exe 1236 explorer.exe 2064 explorer.exe 1996 explorer.exe 2188 explorer.exe 2772 smss.exe 2848 explorer.exe 2920 explorer.exe 2860 explorer.exe 2760 explorer.exe 2744 smss.exe 3040 explorer.exe 2800 explorer.exe 1104 explorer.exe 2620 explorer.exe 996 explorer.exe 1620 explorer.exe 2968 smss.exe 3004 explorer.exe 2952 explorer.exe 2972 smss.exe -
Loads dropped DLL 64 IoCs
pid Process 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 1376 explorer.exe 1376 explorer.exe 2352 explorer.exe 2352 explorer.exe 2784 explorer.exe 2784 explorer.exe 2136 explorer.exe 2136 explorer.exe 2788 explorer.exe 2788 explorer.exe 2764 explorer.exe 2764 explorer.exe 2656 explorer.exe 2656 explorer.exe 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 2464 explorer.exe 2464 explorer.exe 1376 explorer.exe 1376 explorer.exe 1508 smss.exe 1508 smss.exe 2352 explorer.exe 2352 explorer.exe 2932 explorer.exe 2932 explorer.exe 316 smss.exe 316 smss.exe 2692 explorer.exe 2692 explorer.exe 2784 explorer.exe 2784 explorer.exe 3000 smss.exe 3000 smss.exe 1908 explorer.exe 1908 explorer.exe 1452 explorer.exe 1452 explorer.exe 1964 explorer.exe 1964 explorer.exe 2136 explorer.exe 2136 explorer.exe 2388 smss.exe 2388 smss.exe 2108 explorer.exe 2108 explorer.exe 2084 explorer.exe 2084 explorer.exe 2604 explorer.exe 2604 explorer.exe 1876 explorer.exe 1876 explorer.exe 2788 explorer.exe 2788 explorer.exe 2212 smss.exe 2212 smss.exe 2300 explorer.exe 2300 explorer.exe 1536 explorer.exe 1536 explorer.exe 936 explorer.exe 936 explorer.exe -
resource yara_rule behavioral1/memory/2436-0-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0008000000016d32-3.dat upx behavioral1/memory/1376-11-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1376-17-0x0000000001DF0000-0x0000000001E4B000-memory.dmp upx behavioral1/memory/2352-20-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2436-19-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1376-21-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2352-25-0x0000000000260000-0x00000000002BB000-memory.dmp upx behavioral1/memory/2352-28-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2136-35-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2784-36-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2788-42-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2136-44-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2788-50-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2656-56-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2764-59-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2656-68-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2464-73-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1508-78-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/316-77-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2932-83-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/316-87-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/3000-86-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1452-97-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2692-95-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/3000-101-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2388-105-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2108-111-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1452-110-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1908-109-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2084-114-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1964-115-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2388-116-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1876-118-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2108-117-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2084-120-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2604-121-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2300-122-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1876-123-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/936-125-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2212-126-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2300-127-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2276-128-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1536-129-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/936-131-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1648-132-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1980-134-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1552-133-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2276-135-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/816-136-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1648-137-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1980-138-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1276-139-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2156-140-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1708-141-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2484-142-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1020-143-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2156-144-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2184-147-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2124-145-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1640-149-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2120-152-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1440-151-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/2184-153-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\e: smss.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\k: Process not Found File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\n: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\i: explorer.exe File opened (read-only) \??\r: smss.exe File opened (read-only) \??\s: explorer.exe File opened (read-only) \??\k: smss.exe File opened (read-only) \??\z: smss.exe File opened (read-only) \??\g: explorer.exe File opened (read-only) \??\e: explorer.exe File opened (read-only) \??\y: explorer.exe File opened (read-only) \??\n: Process not Found File opened (read-only) \??\o: smss.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\l: smss.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\z: Process not Found File opened (read-only) \??\m: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\v: smss.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\s: Process not Found File opened (read-only) \??\v: Process not Found File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\i: smss.exe File opened (read-only) \??\k: explorer.exe File opened (read-only) \??\e: smss.exe File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\w: explorer.exe File opened (read-only) \??\z: Process not Found File opened (read-only) \??\r: Process not Found File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\h: smss.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\x: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\r: explorer.exe File opened (read-only) \??\o: explorer.exe File opened (read-only) \??\z: explorer.exe File opened (read-only) \??\z: smss.exe File opened (read-only) \??\v: explorer.exe File opened (read-only) \??\q: explorer.exe File opened (read-only) \??\v: Process not Found File opened (read-only) \??\p: explorer.exe File opened (read-only) \??\e: smss.exe File opened (read-only) \??\u: explorer.exe File opened (read-only) \??\z: Process not Found -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe smss.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe smss.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe Process not Found File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe Process not Found File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe Process not Found File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe smss.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\albgtmnsto\smss.exe explorer.exe File created C:\Windows\SysWOW64\hjbxqidyqd\explorer.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 1376 explorer.exe 2352 explorer.exe 2784 explorer.exe 2136 explorer.exe 2788 explorer.exe 2764 explorer.exe 2656 explorer.exe 2464 explorer.exe 1508 smss.exe 2932 explorer.exe 316 smss.exe 2692 explorer.exe 3000 smss.exe 1908 explorer.exe 1452 explorer.exe 1964 explorer.exe 2388 smss.exe 2108 explorer.exe 2084 explorer.exe 2604 explorer.exe 1876 explorer.exe 2212 smss.exe 2300 explorer.exe 1536 explorer.exe 936 explorer.exe 1552 explorer.exe 2276 explorer.exe 816 smss.exe 1648 explorer.exe 1980 explorer.exe 1276 explorer.exe 1708 explorer.exe 2484 explorer.exe 1020 smss.exe 2156 explorer.exe 2124 explorer.exe 1640 explorer.exe 2120 explorer.exe 2184 smss.exe 1888 explorer.exe 2224 explorer.exe 1440 explorer.exe 1968 explorer.exe 1528 explorer.exe 1236 explorer.exe 2064 explorer.exe 1996 explorer.exe 2188 explorer.exe 2772 smss.exe 2848 explorer.exe 2920 explorer.exe 2860 explorer.exe 2760 explorer.exe 2744 smss.exe 3040 explorer.exe 2800 explorer.exe 1104 explorer.exe 2620 explorer.exe 996 explorer.exe 1620 explorer.exe 2968 smss.exe 3004 explorer.exe 2952 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLoadDriverPrivilege 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe Token: SeLoadDriverPrivilege 1376 explorer.exe Token: SeLoadDriverPrivilege 2352 explorer.exe Token: SeLoadDriverPrivilege 2784 explorer.exe Token: SeLoadDriverPrivilege 2136 explorer.exe Token: SeLoadDriverPrivilege 2788 explorer.exe Token: SeLoadDriverPrivilege 2764 explorer.exe Token: SeLoadDriverPrivilege 2656 explorer.exe Token: SeLoadDriverPrivilege 2464 explorer.exe Token: SeLoadDriverPrivilege 1508 smss.exe Token: SeLoadDriverPrivilege 2932 explorer.exe Token: SeLoadDriverPrivilege 316 smss.exe Token: SeLoadDriverPrivilege 2692 explorer.exe Token: SeLoadDriverPrivilege 3000 smss.exe Token: SeLoadDriverPrivilege 1908 explorer.exe Token: SeLoadDriverPrivilege 1452 explorer.exe Token: SeLoadDriverPrivilege 1964 explorer.exe Token: SeLoadDriverPrivilege 2388 smss.exe Token: SeLoadDriverPrivilege 2108 explorer.exe Token: SeLoadDriverPrivilege 2084 explorer.exe Token: SeLoadDriverPrivilege 2604 explorer.exe Token: SeLoadDriverPrivilege 1876 explorer.exe Token: SeLoadDriverPrivilege 2212 smss.exe Token: SeLoadDriverPrivilege 2300 explorer.exe Token: SeLoadDriverPrivilege 1536 explorer.exe Token: SeLoadDriverPrivilege 936 explorer.exe Token: SeLoadDriverPrivilege 1552 explorer.exe Token: SeLoadDriverPrivilege 2276 explorer.exe Token: SeLoadDriverPrivilege 816 smss.exe Token: SeLoadDriverPrivilege 1648 explorer.exe Token: SeLoadDriverPrivilege 1980 explorer.exe Token: SeLoadDriverPrivilege 1276 explorer.exe Token: SeLoadDriverPrivilege 1708 explorer.exe Token: SeLoadDriverPrivilege 2484 explorer.exe Token: SeLoadDriverPrivilege 1020 smss.exe Token: SeLoadDriverPrivilege 2156 explorer.exe Token: SeLoadDriverPrivilege 2124 explorer.exe Token: SeLoadDriverPrivilege 1640 explorer.exe Token: SeLoadDriverPrivilege 2120 explorer.exe Token: SeLoadDriverPrivilege 2184 smss.exe Token: SeLoadDriverPrivilege 1888 explorer.exe Token: SeLoadDriverPrivilege 2224 explorer.exe Token: SeLoadDriverPrivilege 1440 explorer.exe Token: SeLoadDriverPrivilege 1968 explorer.exe Token: SeLoadDriverPrivilege 1528 explorer.exe Token: SeLoadDriverPrivilege 1236 explorer.exe Token: SeLoadDriverPrivilege 2064 explorer.exe Token: SeLoadDriverPrivilege 1996 explorer.exe Token: SeLoadDriverPrivilege 2188 explorer.exe Token: SeLoadDriverPrivilege 2772 smss.exe Token: SeLoadDriverPrivilege 2848 explorer.exe Token: SeLoadDriverPrivilege 2920 explorer.exe Token: SeLoadDriverPrivilege 2860 explorer.exe Token: SeLoadDriverPrivilege 2760 explorer.exe Token: SeLoadDriverPrivilege 2744 smss.exe Token: SeLoadDriverPrivilege 3040 explorer.exe Token: SeLoadDriverPrivilege 2800 explorer.exe Token: SeLoadDriverPrivilege 1104 explorer.exe Token: SeLoadDriverPrivilege 2620 explorer.exe Token: SeLoadDriverPrivilege 996 explorer.exe Token: SeLoadDriverPrivilege 1620 explorer.exe Token: SeLoadDriverPrivilege 2968 smss.exe Token: SeLoadDriverPrivilege 3004 explorer.exe Token: SeLoadDriverPrivilege 2952 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1376 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 1376 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 1376 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 30 PID 2436 wrote to memory of 1376 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 30 PID 1376 wrote to memory of 2352 1376 explorer.exe 32 PID 1376 wrote to memory of 2352 1376 explorer.exe 32 PID 1376 wrote to memory of 2352 1376 explorer.exe 32 PID 1376 wrote to memory of 2352 1376 explorer.exe 32 PID 2352 wrote to memory of 2784 2352 explorer.exe 33 PID 2352 wrote to memory of 2784 2352 explorer.exe 33 PID 2352 wrote to memory of 2784 2352 explorer.exe 33 PID 2352 wrote to memory of 2784 2352 explorer.exe 33 PID 2784 wrote to memory of 2136 2784 explorer.exe 34 PID 2784 wrote to memory of 2136 2784 explorer.exe 34 PID 2784 wrote to memory of 2136 2784 explorer.exe 34 PID 2784 wrote to memory of 2136 2784 explorer.exe 34 PID 2136 wrote to memory of 2788 2136 explorer.exe 35 PID 2136 wrote to memory of 2788 2136 explorer.exe 35 PID 2136 wrote to memory of 2788 2136 explorer.exe 35 PID 2136 wrote to memory of 2788 2136 explorer.exe 35 PID 2788 wrote to memory of 2764 2788 explorer.exe 36 PID 2788 wrote to memory of 2764 2788 explorer.exe 36 PID 2788 wrote to memory of 2764 2788 explorer.exe 36 PID 2788 wrote to memory of 2764 2788 explorer.exe 36 PID 2764 wrote to memory of 2656 2764 explorer.exe 37 PID 2764 wrote to memory of 2656 2764 explorer.exe 37 PID 2764 wrote to memory of 2656 2764 explorer.exe 37 PID 2764 wrote to memory of 2656 2764 explorer.exe 37 PID 2656 wrote to memory of 2464 2656 explorer.exe 38 PID 2656 wrote to memory of 2464 2656 explorer.exe 38 PID 2656 wrote to memory of 2464 2656 explorer.exe 38 PID 2656 wrote to memory of 2464 2656 explorer.exe 38 PID 2436 wrote to memory of 1508 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 39 PID 2436 wrote to memory of 1508 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 39 PID 2436 wrote to memory of 1508 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 39 PID 2436 wrote to memory of 1508 2436 a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe 39 PID 2464 wrote to memory of 2932 2464 explorer.exe 40 PID 2464 wrote to memory of 2932 2464 explorer.exe 40 PID 2464 wrote to memory of 2932 2464 explorer.exe 40 PID 2464 wrote to memory of 2932 2464 explorer.exe 40 PID 1376 wrote to memory of 316 1376 explorer.exe 41 PID 1376 wrote to memory of 316 1376 explorer.exe 41 PID 1376 wrote to memory of 316 1376 explorer.exe 41 PID 1376 wrote to memory of 316 1376 explorer.exe 41 PID 1508 wrote to memory of 2692 1508 smss.exe 42 PID 1508 wrote to memory of 2692 1508 smss.exe 42 PID 1508 wrote to memory of 2692 1508 smss.exe 42 PID 1508 wrote to memory of 2692 1508 smss.exe 42 PID 2352 wrote to memory of 3000 2352 explorer.exe 43 PID 2352 wrote to memory of 3000 2352 explorer.exe 43 PID 2352 wrote to memory of 3000 2352 explorer.exe 43 PID 2352 wrote to memory of 3000 2352 explorer.exe 43 PID 2932 wrote to memory of 1908 2932 explorer.exe 44 PID 2932 wrote to memory of 1908 2932 explorer.exe 44 PID 2932 wrote to memory of 1908 2932 explorer.exe 44 PID 2932 wrote to memory of 1908 2932 explorer.exe 44 PID 316 wrote to memory of 1452 316 smss.exe 45 PID 316 wrote to memory of 1452 316 smss.exe 45 PID 316 wrote to memory of 1452 316 smss.exe 45 PID 316 wrote to memory of 1452 316 smss.exe 45 PID 2692 wrote to memory of 1964 2692 explorer.exe 46 PID 2692 wrote to memory of 1964 2692 explorer.exe 46 PID 2692 wrote to memory of 1964 2692 explorer.exe 46 PID 2692 wrote to memory of 1964 2692 explorer.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a83a220af3d5851fce04ea753b2e5b0c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:936 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:2116
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:2820
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:3292
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Drops file in System32 directory
PID:3828 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:4340
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:5096
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe24⤵PID:6024
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe25⤵PID:7136
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe26⤵
- Drops file in System32 directory
PID:8420 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe27⤵PID:10308
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe28⤵PID:12772
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe23⤵PID:14700
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe22⤵
- System Location Discovery: System Language Discovery
PID:12120 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:14928
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe21⤵
- Drops file in System32 directory
PID:10032 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:11492
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:15488
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe20⤵PID:8356
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵
- Enumerates connected drives
PID:12652 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:15940
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe19⤵
- System Location Discovery: System Language Discovery
PID:7048 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8368
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Enumerates connected drives
PID:3132 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12600
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:15868
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe18⤵PID:6000
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:7036
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8380
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- System Location Discovery: System Language Discovery
PID:10252 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12644
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:15892
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:2936
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵
- System Location Discovery: System Language Discovery
PID:6044 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:1412
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵
- Drops file in System32 directory
PID:8476 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10276
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12704
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:4392
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:1512 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6068
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵
- Enumerates connected drives
PID:8532 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10340
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12792
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14780
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:3840
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:4560
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6084
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:6380 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵
- System Location Discovery: System Language Discovery
PID:8484 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10348
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:12732
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14804
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:12180
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15172
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:3312
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3880
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:4404 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:2992
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6060
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:1964
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8524
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10292
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12688
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14812
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:12204
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15160
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵
- Enumerates connected drives
PID:10100 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Enumerates connected drives
PID:12364 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15632
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:740
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3324
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3848
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4352
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:4216
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6052
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:7160
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8468
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Enumerates connected drives
PID:10324 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:13032
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14760
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:12128
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵
- Drops file in System32 directory
PID:14864
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:10024
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12264
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15256
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:8336
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10260
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12696
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:1868
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:1568 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3300
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3856
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4368
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:2508
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6092
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:2388
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵
- System Location Discovery: System Language Discovery
PID:8492 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10300
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12676
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:15876
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14768
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵
- System Location Discovery: System Language Discovery
PID:12188 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵
- Drops file in System32 directory
PID:15180
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:10016
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:11132
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:4208
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:8316
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- System Location Discovery: System Language Discovery
PID:12584 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15676
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:7076
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8396
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10360
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13040
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2592
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:2804
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3268
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3788
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4304
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:5104
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:5928
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:7096
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8516
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10332
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12720
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14740
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:12092
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:14856
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:10000
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:3576
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15240
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:8288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Enumerates connected drives
PID:10204 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:11780
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15524
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:6988
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8252
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10232
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12372
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15648
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:5952
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:6976
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8280
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:1208
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12352
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15656
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
PID:1380 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:3048
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3236
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
PID:3776 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4268
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:5000
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:5868
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:6956
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8220
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10064
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12272
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:15264
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14664
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:12040
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:14900
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:9992
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12256
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15232
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:8212
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10148
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15516
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:6924
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8204
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10084
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:3632
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵
- Drops file in System32 directory
PID:15280
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:5896
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:6940
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8196
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10076
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:4424
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:5064
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:5936 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7068
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8444
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:12388 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15508
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2392
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3216
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3736
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4232
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:4988
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:5824
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:6864
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:2604
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Enumerates connected drives
PID:9856 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:12048
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe23⤵PID:14908
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:14644
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:12012
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:14884
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:9880
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12104
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:14952
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:1168
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:9924 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:12212 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15204
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:6892
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:7772
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:9900
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Enumerates connected drives
PID:12060 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:14936
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:5840
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:6904
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:7892
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:9932
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12148
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15100
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:5024
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:5860
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- System Location Discovery: System Language Discovery
PID:6912 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:2688
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:9964
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12196
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15196
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4244
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5016
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
PID:5920 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Enumerates connected drives
PID:7056 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8388
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:1676
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:12592 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15916
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:14656
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:1912
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:1972
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3976
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4508
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:5224 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:108
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:7260
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:8796
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:10612
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:13264
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵
- Drops file in System32 directory
PID:15344
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵
- System Location Discovery: System Language Discovery
PID:12552 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:15604
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:10504
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:12824
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:8808
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10572
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13180
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:7308
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8832
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10828
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4016
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:6164
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7360
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8912
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:10784 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:2244
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:5248
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6172
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:7376 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8920
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10844
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:1968
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4532
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5268
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6200
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7400
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8928
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10792
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3896
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:14688
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:4000
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4544
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6208
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7388
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:8892
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:10776
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:1164
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:4212
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:12632
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:15624
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:2132
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2844
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:1480 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3540
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4712
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:5484
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6456
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:7712
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:1500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:3360
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:13748
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe17⤵PID:15824
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:13252
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:3356
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13636
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:2372
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11244
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13676
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵
- System Location Discovery: System Language Discovery
PID:7740 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9260
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:2468
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- System Location Discovery: System Language Discovery
PID:13776
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:6476
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7760
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9272
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:768
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13812
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵
- Enumerates connected drives
PID:5504 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
PID:6464 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:7724 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9284
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11272
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13804
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4732
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5520
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6504
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7776
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9300
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:13860
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵
- Drops file in System32 directory
PID:15848
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:1612
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4720
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5496
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6484
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7732
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9248
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:10368 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:13788
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:15816
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:13240
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:3548
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:3096
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4700
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5472
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6444
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7700
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9228
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:2080
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- System Location Discovery: System Language Discovery
PID:13668
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:15804
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:13228
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:11236
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Enumerates connected drives
PID:13608
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:2160
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2028
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:3100
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3584
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3620
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4764
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:5548
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6532
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵
- System Location Discovery: System Language Discovery
PID:7812 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:9348 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:11356
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:14100
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:13620
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:11348
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14052
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:9360
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:11368 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14092
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:7824
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9372
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11376
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14132
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:6564
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7868
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9432
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11452
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14148
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:5560
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- System Location Discovery: System Language Discovery
PID:6544 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:7844 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9408
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11404
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14124
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4776
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5568
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6552
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7836
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9384
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11388
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14108
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:3636
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4788
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5580
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
PID:6580 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7856
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9392
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11444
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14116
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵
- Enumerates connected drives
PID:13692
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:3604
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:2216
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4800
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5596
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6592
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Enumerates connected drives
PID:7884 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9440
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
PID:11464 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14140
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:13684
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:11436
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14084
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:3112
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3596
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Drops file in System32 directory
PID:3760 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Enumerates connected drives
PID:4808 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5604
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- System Location Discovery: System Language Discovery
PID:6604 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- System Location Discovery: System Language Discovery
PID:7900 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9460
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14164
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:13700
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:11420
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14076
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:9420
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- System Location Discovery: System Language Discovery
PID:11476 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14156
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:1624
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2696
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:3144
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3648
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:4140
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:4868
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:5652
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:6644
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:7960
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:9560
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Drops file in System32 directory
PID:11600 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:14272
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:14012
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵
- System Location Discovery: System Language Discovery
PID:11608 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14248
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:9532
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Enumerates connected drives
PID:11636 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14300
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:7952
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9548
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
PID:11672 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14364
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:6660
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7972
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9576
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11680
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14320
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:5644
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6708
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8004
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9620
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11700
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14440
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4860
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- System Location Discovery: System Language Discovery
PID:5676 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6680
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8036
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9660
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11744
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14520
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵
- System Location Discovery: System Language Discovery
PID:4128 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4884
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5696
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- System Location Discovery: System Language Discovery
PID:6728 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8048
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9628
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11752
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- Drops file in System32 directory
PID:14496
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14040
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:3660
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4108
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4848
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5664
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6672
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:7984
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9612
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11732
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14448
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵
- Enumerates connected drives
PID:14024
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:11572
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14256
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:3168
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3676
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4156
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4900
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5704
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6720
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Enumerates connected drives
PID:8060 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9672
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11768
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14504
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵
- Enumerates connected drives
PID:14060
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:11656
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14264
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:9600
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Enumerates connected drives
PID:11688 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14392
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:2480
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3156
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3640
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4116
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Drops file in System32 directory
PID:4840 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5636
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6652
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8020
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9636
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:11712
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14400
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14004
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵
- System Location Discovery: System Language Discovery
PID:11580 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Drops file in System32 directory
PID:14240
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:9524
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:11616
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14280
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:7992
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:9584
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:11644
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14308
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:2280
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2896
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:3260
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3800
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:4292
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:5048
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:5888
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵
- System Location Discovery: System Language Discovery
PID:7016 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵
- Enumerates connected drives
PID:8272 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:10196
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵PID:12296
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe22⤵PID:15640
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:14692
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:12080
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:14892
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵
- Enumerates connected drives
PID:10008 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12232
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15272
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:8228
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3200
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12608
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15932
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵
- System Location Discovery: System Language Discovery
PID:7004 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8328
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:2088
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12400
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15532
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:5960
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7024
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8344
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- Drops file in System32 directory
PID:3084 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12560
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15664
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- Enumerates connected drives
PID:6036 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7152
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10316
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12712
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:4332
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:1864
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6076
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:236
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8648
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10268
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12660
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15884
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14748
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:3768
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4280
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5056
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5944
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7124
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8508
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- System Location Discovery: System Language Discovery
PID:10284 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:12668 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15924
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14724
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12068
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14848
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:3252
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Drops file in System32 directory
PID:3808 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Enumerates connected drives
PID:4316 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Drops file in System32 directory
PID:5080 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5908
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7108
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8412
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9952
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:12576
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15840
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14680
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12112
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Enumerates connected drives
PID:15152
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:9984
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:12284
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15248
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:2264
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Drops file in System32 directory
PID:3228 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3752
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4252
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5008
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- Drops file in System32 directory
PID:5848 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6948
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8236
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10120
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3628
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:2920
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14716
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵
- Drops file in System32 directory
PID:12028 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14840
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵
- Enumerates connected drives
PID:9940 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:12220
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15212
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:2196
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10108
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:3572
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15224
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵PID:1112
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:2020
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3204
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3724
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:4976
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- System Location Discovery: System Language Discovery
PID:5812 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:6856
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:2840
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:9912
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:12140 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15116
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:14616
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:11976
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14608
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵
- Enumerates connected drives
PID:9844 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:11996
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14632
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵
- Drops file in System32 directory
PID:1268 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Drops file in System32 directory
PID:9864 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:11988
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:14944
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:6876
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:7632
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:9888
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:12156
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15188
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:3008
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:2564
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
PID:1656 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:3380
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:3948
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:4468
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:5204
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:2808
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵
- System Location Discovery: System Language Discovery
PID:7336 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵PID:8868
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:10800
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Enumerates connected drives
PID:1504
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:15328
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵
- System Location Discovery: System Language Discovery
PID:12516 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵PID:15580
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:10488
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13000
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:8684
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10540
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13156
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:7204
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Drops file in System32 directory
PID:8752 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10588
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13164
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:2428
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7196
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Enumerates connected drives
PID:8692 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10564
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13100
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:5160
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:5532
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7188
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8712
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10620
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13288
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:4460
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5180
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6020
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7248
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8724
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10596
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13196
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15312
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4448
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5172 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7268
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8824
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10740
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13308
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15304
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15612
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:3396
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3940
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Drops file in System32 directory
PID:4476 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- System Location Discovery: System Language Discovery
PID:5192 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:2712
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7328
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8860
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10760
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13300
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15336
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12528
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15596
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:10452
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:12748
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:2240
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3364
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3956
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5232
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:1452
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7320
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8852
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10808
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15352
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12540
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15572
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:10476
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:12816
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:8672
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10532
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13072
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵PID:2580
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:2828
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3372
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3924
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4440
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5148
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:3000
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7228
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8768
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10556
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13172
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15292
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12492
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15552
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:10460
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:12760
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:8664
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10548
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13092
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:7212
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:8732
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10604
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13280
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe4⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵PID:1652
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:2732
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3984
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4524
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5256
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6180
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7368
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:8900
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- System Location Discovery: System Language Discovery
PID:10836 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:3908
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:4184
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:12620
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:15588
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:10516
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13008
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:8780
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10580
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13188
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:7276
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:8760
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10632
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Drops file in System32 directory
PID:13272
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵PID:5392
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:7300
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:8840
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10768
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:1440
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:1588
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:308
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:2568
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:4088
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:4664
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe16⤵
- System Location Discovery: System Language Discovery
PID:5440 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe17⤵PID:6400
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe18⤵PID:7656
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe19⤵
- Enumerates connected drives
PID:1536 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe20⤵PID:11256
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe21⤵
- Drops file in System32 directory
PID:13732
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe16⤵PID:15776
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe15⤵PID:13144
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe14⤵PID:11080
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13464
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe13⤵PID:936
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11192
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13600
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe12⤵PID:7624
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:1220
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11164
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- System Location Discovery: System Language Discovery
PID:13572
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe11⤵PID:6392
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7644
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Enumerates connected drives
PID:1664 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11220
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13644
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:5432
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6384
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7636
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:292
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11212
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13652
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:4672
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5424
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6416
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7668
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵
- Enumerates connected drives
PID:8660 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11228
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13764
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15748
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:2988
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4652
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- System Location Discovery: System Language Discovery
PID:5408 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6356
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7592
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:9168
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11136
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13564
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15756
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵
- Drops file in System32 directory
PID:13128
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:3516
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:3076
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4688
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5460
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6432
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7688
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:1800
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10524
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13740
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵
- Enumerates connected drives
PID:15788
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:13204
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵
- Drops file in System32 directory
PID:11172 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13540
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵
- Enumerates connected drives
PID:3012 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:4064
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4628
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5384
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6340
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7544
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:9128
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:11060
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13516
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15728
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:13084
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:11068
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13508
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:9184
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Drops file in System32 directory
PID:11144 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- System Location Discovery: System Language Discovery
PID:13592
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵PID:944
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵
- Enumerates connected drives
PID:2248 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3492
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:4072
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4640
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5400
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵
- Enumerates connected drives
PID:6364 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵
- Enumerates connected drives
PID:7584 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:9156
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- Drops file in System32 directory
PID:11088 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵
- Drops file in System32 directory
PID:13524
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15736
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:13116
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:11048
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13428
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:9176
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11108
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13532
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:7608
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:9196
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11116
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13556
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe4⤵PID:2720
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵PID:2040
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:2136
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- System Location Discovery: System Language Discovery
PID:3476 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:4040
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4608
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵
- System Location Discovery: System Language Discovery
PID:5356 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6284
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7500
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:9060
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵
- Enumerates connected drives
PID:10944 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13348
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15696
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:13060
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:10976
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13380
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:9096
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11000
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13448
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵
- Drops file in System32 directory
PID:7560 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:9120
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵
- Drops file in System32 directory
PID:11036 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13492
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵PID:6332
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:7572
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:9212
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11184
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13660
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe4⤵PID:1696
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵PID:2288
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:2924
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:3468
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:4048
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:4600
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe10⤵PID:5348
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe11⤵PID:6292
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe12⤵PID:7492
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe13⤵PID:9052
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe14⤵PID:10952
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe15⤵PID:13436
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe10⤵PID:15708
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe9⤵PID:13048
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe8⤵PID:10968
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13356
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe7⤵PID:9084
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11008
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- Drops file in System32 directory
PID:13484
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe6⤵PID:7524
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:9140
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11124
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13584
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe5⤵
- Enumerates connected drives
PID:6304 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:7516
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵PID:9076
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:10988
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵PID:13476
-
-
-
-
-
-
-
C:\Windows\SysWOW64\albgtmnsto\smss.exeC:\Windows\system32\albgtmnsto\smss.exe4⤵PID:5368
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe5⤵PID:6320
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe6⤵PID:7536
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe7⤵
- Drops file in System32 directory
PID:9112 -
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe8⤵PID:11028
-
C:\Windows\SysWOW64\hjbxqidyqd\explorer.exeC:\Windows\system32\hjbxqidyqd\explorer.exe9⤵
- System Location Discovery: System Language Discovery
PID:13500
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5a83a220af3d5851fce04ea753b2e5b0c
SHA17c55ce2b64097f72fa2dad694a0a62601c2f1917
SHA256806bb04d260fa035ba3743451b59e454097ce87b104a6e877e3eeb5133174cf0
SHA51240f5f60d96fddd922fd15ab718c125a8f0f0de51298de0f2033aba3a56e302ec5aaa4717cedbf18e9c0ff3a1ac5c89ca69980a72be0dddd4d4140d4a42a57f7e