Analysis
-
max time kernel
4294212s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
13-03-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe
Resource
win10v2004-en-20220113
General
-
Target
f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe
-
Size
3.2MB
-
MD5
0ad600b00aa2381172fefcadfd558f94
-
SHA1
d761bd0ea41910dd981919c2e520b04b3e23b443
-
SHA256
f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215
-
SHA512
92d4561b6793b20293de88bedd36ad4d3c74492b5926efd61588e83f8be8c863a9309596b63ca0591829929f45196f08f14e718163ed1c00e93b04ef844c6ea6
Malware Config
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Extracted
redline
Cana
176.111.174.254:56328
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
resource yara_rule behavioral1/memory/364-177-0x00000000049B0000-0x00000000049D0000-memory.dmp family_redline behavioral1/memory/364-194-0x0000000004B30000-0x0000000008B11000-memory.dmp family_redline behavioral1/memory/364-246-0x0000000004B00000-0x0000000004B1E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
suricata: ET MALWARE Win32.Raccoon Stealer - Telegram Mirror Checkin (generic)
-
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
-
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/1304-144-0x00000000045A0000-0x000000000463D000-memory.dmp family_vidar behavioral1/memory/1304-148-0x0000000000400000-0x0000000004424000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x00080000000122da-55.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-57.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-56.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-58.dat aspack_v212_v242 behavioral1/files/0x00080000000122d0-61.dat aspack_v212_v242 behavioral1/files/0x00080000000122d0-62.dat aspack_v212_v242 behavioral1/files/0x00080000000122ce-63.dat aspack_v212_v242 behavioral1/files/0x00080000000122ce-64.dat aspack_v212_v242 behavioral1/files/0x00080000000122d4-67.dat aspack_v212_v242 behavioral1/files/0x00080000000122d4-68.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-70.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-71.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-72.dat aspack_v212_v242 behavioral1/files/0x00080000000122da-73.dat aspack_v212_v242 -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 1672 setup_install.exe 1304 jobiea_1.exe 1836 jobiea_2.exe 364 jobiea_8.exe 1316 jobiea_4.exe 1616 jobiea_6.exe -
Modifies Windows Firewall 1 TTPs
-
resource yara_rule behavioral1/files/0x00080000000122e2-155.dat upx behavioral1/files/0x00080000000122e2-154.dat upx behavioral1/files/0x00080000000122e2-156.dat upx behavioral1/files/0x00080000000122e2-158.dat upx behavioral1/files/0x00080000000122e2-160.dat upx behavioral1/files/0x00080000000122e2-159.dat upx -
Loads dropped DLL 29 IoCs
pid Process 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 1672 setup_install.exe 1672 setup_install.exe 1672 setup_install.exe 1672 setup_install.exe 1672 setup_install.exe 1672 setup_install.exe 1672 setup_install.exe 1672 setup_install.exe 1932 cmd.exe 1932 cmd.exe 1348 cmd.exe 1348 cmd.exe 1896 cmd.exe 1304 jobiea_1.exe 1304 jobiea_1.exe 1896 cmd.exe 628 cmd.exe 1836 jobiea_2.exe 1836 jobiea_2.exe 364 jobiea_8.exe 364 jobiea_8.exe 1316 jobiea_4.exe 1316 jobiea_4.exe 1580 cmd.exe 1616 jobiea_6.exe 1616 jobiea_6.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 5 ipinfo.io 9 ip-api.com -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2160 1304 WerFault.exe 37 2260 2288 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2092 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2052 tasklist.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1988 wrote to memory of 1672 1988 f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe 27 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1932 1672 setup_install.exe 29 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1348 1672 setup_install.exe 30 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 1340 1672 setup_install.exe 31 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 628 1672 setup_install.exe 32 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1460 1672 setup_install.exe 36 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1580 1672 setup_install.exe 35 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1104 1672 setup_install.exe 34 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1672 wrote to memory of 1896 1672 setup_install.exe 33 PID 1932 wrote to memory of 1304 1932 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe"C:\Users\Admin\AppData\Local\Temp\f278959980ff3dccad6aad448f4dca4034f2832fe85269c0d11b504c270da215.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\setup_install.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_1.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\jobiea_1.exejobiea_1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 9645⤵
- Program crash
PID:2160
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_2.exe3⤵
- Loads dropped DLL
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\jobiea_2.exejobiea_2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_3.exe3⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\jobiea_3.exejobiea_3.exe4⤵PID:1936
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",getmft5⤵PID:1852
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_4.exe3⤵
- Loads dropped DLL
PID:628 -
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\jobiea_4.exejobiea_4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵PID:688
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_8.exe3⤵
- Loads dropped DLL
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\jobiea_8.exejobiea_8.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:364
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_7.exe3⤵PID:1104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_6.exe3⤵
- Loads dropped DLL
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\7zS4C7B2356\jobiea_6.exejobiea_6.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\Documents\0zfHdhstWDKXiZTt81b1Mnbz.exe"C:\Users\Admin\Documents\0zfHdhstWDKXiZTt81b1Mnbz.exe"5⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 4846⤵
- Program crash
PID:2260
-
-
-
C:\Users\Admin\Documents\GDtyGw9L4KFucURCV6VMdXQL.exe"C:\Users\Admin\Documents\GDtyGw9L4KFucURCV6VMdXQL.exe"5⤵PID:2300
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2488
-
-
-
C:\Users\Admin\Documents\nixgdI1BNxwWAprAI4rOIKNS.exe"C:\Users\Admin\Documents\nixgdI1BNxwWAprAI4rOIKNS.exe"5⤵PID:2392
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\cjlwwcda\6⤵PID:2364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ddkpvoxu.exe" C:\Windows\SysWOW64\cjlwwcda\6⤵PID:2412
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create cjlwwcda binPath= "C:\Windows\SysWOW64\cjlwwcda\ddkpvoxu.exe /d\"C:\Users\Admin\Documents\nixgdI1BNxwWAprAI4rOIKNS.exe\"" type= own start= auto DisplayName= "wifi support"6⤵PID:2436
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start cjlwwcda6⤵PID:2536
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul6⤵PID:2204
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description cjlwwcda "wifi internet conection"6⤵PID:1540
-
-
-
C:\Users\Admin\Documents\ZuxTGmeIJMnr_uyWoreScKAm.exe"C:\Users\Admin\Documents\ZuxTGmeIJMnr_uyWoreScKAm.exe"5⤵PID:2600
-
-
C:\Users\Admin\Documents\6ShCoLr7qIK97S7zAm8MgY2y.exe"C:\Users\Admin\Documents\6ShCoLr7qIK97S7zAm8MgY2y.exe"5⤵PID:2652
-
-
C:\Users\Admin\Documents\MaS1Vfgo5PVEKAr03_VNKwJj.exe"C:\Users\Admin\Documents\MaS1Vfgo5PVEKAr03_VNKwJj.exe"5⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "MaS1Vfgo5PVEKAr03_VNKwJj.exe" /f & erase "C:\Users\Admin\Documents\MaS1Vfgo5PVEKAr03_VNKwJj.exe" & exit6⤵PID:1768
-
-
-
C:\Users\Admin\Documents\FzvM13xynOTcswyfC1NguCfQ.exe"C:\Users\Admin\Documents\FzvM13xynOTcswyfC1NguCfQ.exe"5⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\dada.exe"C:\Users\Admin\AppData\Local\Temp\dada.exe"6⤵PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"6⤵PID:3004
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN Cache-S-21-2946144819-3e21f723 /TR "C:\Users\Admin\AppData\Local\cache\MoUSO.exe"7⤵
- Creates scheduled task(s)
PID:2092
-
-
-
-
C:\Users\Admin\Documents\aGJntv6NYpJDiyAUDrpNCRJV.exe"C:\Users\Admin\Documents\aGJntv6NYpJDiyAUDrpNCRJV.exe"5⤵PID:2700
-
-
C:\Users\Admin\Documents\XzON_oKhdVC3gn98mjwqNgXY.exe"C:\Users\Admin\Documents\XzON_oKhdVC3gn98mjwqNgXY.exe"5⤵PID:2712
-
-
C:\Users\Admin\Documents\iuCStzaR2qY2s7oG2x84_dGc.exe"C:\Users\Admin\Documents\iuCStzaR2qY2s7oG2x84_dGc.exe"5⤵PID:2764
-
-
C:\Users\Admin\Documents\sKwMVmANc4uBp9143pbcfgRE.exe"C:\Users\Admin\Documents\sKwMVmANc4uBp9143pbcfgRE.exe"5⤵PID:2852
-
-
C:\Users\Admin\Documents\eXP2YXownajCvlhPcCaua5Po.exe"C:\Users\Admin\Documents\eXP2YXownajCvlhPcCaua5Po.exe"5⤵PID:3052
-
-
C:\Users\Admin\Documents\XeCtO0mAT1GDYH1Nj4Nob65F.exe"C:\Users\Admin\Documents\XeCtO0mAT1GDYH1Nj4Nob65F.exe"5⤵PID:2752
-
-
C:\Users\Admin\Documents\6lRzNbmPSPdyy5AWmMeX1Y7e.exe"C:\Users\Admin\Documents\6lRzNbmPSPdyy5AWmMeX1Y7e.exe"5⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\7zS473D.tmp\Install.exe.\Install.exe6⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\7zSBCCA.tmp\Install.exe.\Install.exe /S /site_id "525403"7⤵PID:308
-
-
-
-
C:\Users\Admin\Documents\wCnW_v10Xg1e1a_aoSf9pGqz.exe"C:\Users\Admin\Documents\wCnW_v10Xg1e1a_aoSf9pGqz.exe"5⤵PID:2744
-
-
C:\Users\Admin\Documents\t5awey37RhaHyY91LYP0wON2.exe"C:\Users\Admin\Documents\t5awey37RhaHyY91LYP0wON2.exe"5⤵PID:2736
-
-
C:\Users\Admin\Documents\ZVKZ_8oM8kOtAaICZIrkWUFi.exe"C:\Users\Admin\Documents\ZVKZ_8oM8kOtAaICZIrkWUFi.exe"5⤵PID:2728
-
-
C:\Users\Admin\Documents\6XOEcLdPn56Ky5QyXcJfCe2E.exe"C:\Users\Admin\Documents\6XOEcLdPn56Ky5QyXcJfCe2E.exe"5⤵PID:2720
-
-
C:\Users\Admin\Documents\Az6MVAFOidhbdKTVnJQMscH5.exe"C:\Users\Admin\Documents\Az6MVAFOidhbdKTVnJQMscH5.exe"5⤵PID:2692
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c jobiea_5.exe3⤵PID:1460
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1888
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1816
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2244
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2356
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"1⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Affaticato.gif1⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd2⤵PID:3060
-
C:\Windows\SysWOW64\find.exefind /I /N "bullguardcore.exe"3⤵PID:2068
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq BullGuardCore.exe"3⤵
- Enumerates processes with tasklist
PID:2052
-
-
-
C:\Windows\SysWOW64\cjlwwcda\ddkpvoxu.exeC:\Windows\SysWOW64\cjlwwcda\ddkpvoxu.exe /d"C:\Users\Admin\Documents\nixgdI1BNxwWAprAI4rOIKNS.exe"1⤵PID:2824