Overview
overview
10Static
static
setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
setup_x86_...4).exe
windows7_x64
setup_x86_...4).exe
windows10_x64
setup_x86_...5).exe
windows7_x64
setup_x86_...5).exe
windows10_x64
setup_x86_...6).exe
windows7_x64
setup_x86_...6).exe
windows10_x64
setup_x86_...7).exe
windows7_x64
setup_x86_...7).exe
windows10_x64
setup_x86_...8).exe
windows7_x64
setup_x86_...8).exe
windows10_x64
setup_x86_...9).exe
windows7_x64
10setup_x86_...9).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
10setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
10setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
10setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10Resubmissions
11-07-2024 05:43
240711-gej4lstgrf 1006-09-2021 14:13
210906-rjpvrsedbm 1008-07-2021 11:08
210708-4gztl3mwl6 1008-07-2021 08:02
210708-klfb4qeda6 1007-07-2021 09:39
210707-nem57xyvf2 1006-07-2021 17:51
210706-7pcrmjy3fa 1006-07-2021 13:45
210706-eybelwcq86 10Analysis
-
max time kernel
9s -
max time network
199s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02-07-2021 07:35
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install - копия (10).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
setup_x86_x64_install - копия (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
setup_x86_x64_install - копия (11).exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install - копия (11).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
setup_x86_x64_install - копия (12).exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install - копия (12).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
setup_x86_x64_install - копия (13).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
setup_x86_x64_install - копия (13).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
setup_x86_x64_install - копия (14).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
setup_x86_x64_install - копия (14).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
setup_x86_x64_install - копия (15).exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
setup_x86_x64_install - копия (15).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
setup_x86_x64_install - копия (16).exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
setup_x86_x64_install - копия (16).exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
setup_x86_x64_install - копия (17).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
setup_x86_x64_install - копия (17).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
setup_x86_x64_install - копия (18).exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
setup_x86_x64_install - копия (18).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
setup_x86_x64_install - копия (19).exe
Resource
win7v20210408
Behavioral task
behavioral20
Sample
setup_x86_x64_install - копия (19).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
setup_x86_x64_install - копия (2).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
setup_x86_x64_install - копия (2).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
setup_x86_x64_install - копия (20).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
setup_x86_x64_install - копия (20).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
setup_x86_x64_install - копия (21).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
setup_x86_x64_install - копия (21).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
setup_x86_x64_install - копия (22).exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
setup_x86_x64_install - копия (22).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
setup_x86_x64_install - копия (23).exe
Resource
win7v20210408
Behavioral task
behavioral30
Sample
setup_x86_x64_install - копия (23).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
setup_x86_x64_install - копия (3).exe
Resource
win7v20210408
Errors
General
-
Target
setup_x86_x64_install - копия (10).exe
-
Size
3.2MB
-
MD5
3ae1c212119919e5fce71247286f8e0e
-
SHA1
97c1890ab73c539056f95eafede319df774e9d38
-
SHA256
30c2f230e5401b4b1ea8fb425dadf4e453575884303b9fa2066e6a91859f016e
-
SHA512
5bb28a775c10b8b68b8c448d64287ca732d0af5577ecc4348a89934358440bb4ff6958115f14ecbabb0446d234d6f621afa3419daa4aec6c03c0af9b6a3b1558
Malware Config
Extracted
redline
ServAni
87.251.71.195:82
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
redline
02_07_r
rdanoriran.xyz:80
Extracted
redline
PROLIV_02.06.2021
45.144.29.182:19066
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
resource yara_rule behavioral1/memory/2040-165-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2040-166-0x0000000000417F26-mapping.dmp family_redline behavioral1/memory/2040-183-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2408-225-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2408-226-0x0000000000417E3A-mapping.dmp family_redline behavioral1/memory/2408-228-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2396-232-0x0000000000417E6A-mapping.dmp family_redline behavioral1/memory/2396-230-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2396-236-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2108-234-0x0000000000400000-0x000000000442B000-memory.dmp Vidar behavioral1/memory/2088-235-0x0000000000400000-0x0000000004429000-memory.dmp Vidar -
resource yara_rule behavioral1/files/0x000300000001315c-69.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-70.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-71.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-73.dat aspack_v212_v242 behavioral1/files/0x0003000000013158-74.dat aspack_v212_v242 behavioral1/files/0x0003000000013158-75.dat aspack_v212_v242 behavioral1/files/0x0003000000013157-76.dat aspack_v212_v242 behavioral1/files/0x0003000000013157-77.dat aspack_v212_v242 behavioral1/files/0x000300000001315a-83.dat aspack_v212_v242 behavioral1/files/0x000300000001315a-82.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-85.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-87.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-86.dat aspack_v212_v242 behavioral1/files/0x000300000001315c-88.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 1196 setup_installer.exe 612 setup_install.exe 1864 arnatic_2.exe 1724 arnatic_3.exe 1604 arnatic_5.exe 1708 arnatic_7.exe 748 arnatic_4.exe 1304 arnatic_6.exe -
resource yara_rule behavioral1/files/0x0003000000013172-179.dat upx -
Loads dropped DLL 34 IoCs
pid Process 752 setup_x86_x64_install - копия (10).exe 1196 setup_installer.exe 1196 setup_installer.exe 1196 setup_installer.exe 1196 setup_installer.exe 1196 setup_installer.exe 1196 setup_installer.exe 612 setup_install.exe 612 setup_install.exe 612 setup_install.exe 612 setup_install.exe 612 setup_install.exe 612 setup_install.exe 612 setup_install.exe 612 setup_install.exe 1044 cmd.exe 1044 cmd.exe 1864 arnatic_2.exe 1864 arnatic_2.exe 1216 cmd.exe 904 cmd.exe 1560 cmd.exe 1560 cmd.exe 560 cmd.exe 592 cmd.exe 1724 arnatic_3.exe 1724 arnatic_3.exe 1708 arnatic_7.exe 1708 arnatic_7.exe 748 arnatic_4.exe 748 arnatic_4.exe 1304 arnatic_6.exe 1304 arnatic_6.exe 1708 arnatic_7.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com 22 ipinfo.io 23 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
pid pid_target Process procid_target 3056 2108 WerFault.exe 58 1684 2088 WerFault.exe 60 2972 2208 WerFault.exe 78 3136 2700 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 752 wrote to memory of 1196 752 setup_x86_x64_install - копия (10).exe 28 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 1196 wrote to memory of 612 1196 setup_installer.exe 30 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1340 612 setup_install.exe 32 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1044 612 setup_install.exe 33 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 1216 612 setup_install.exe 36 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 560 612 setup_install.exe 34 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 904 612 setup_install.exe 35 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 592 612 setup_install.exe 37 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 612 wrote to memory of 1560 612 setup_install.exe 46 PID 1044 wrote to memory of 1864 1044 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (10).exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (10).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe4⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_2.exearnatic_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe4⤵
- Loads dropped DLL
PID:560 -
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_4.exearnatic_4.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt6⤵PID:1940
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe4⤵
- Loads dropped DLL
PID:904 -
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_5.exearnatic_5.exe5⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Roaming\8038703.exe"C:\Users\Admin\AppData\Roaming\8038703.exe"6⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 15647⤵
- Program crash
PID:3136
-
-
-
C:\Users\Admin\AppData\Roaming\6989956.exe"C:\Users\Admin\AppData\Roaming\6989956.exe"6⤵PID:1952
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe4⤵
- Loads dropped DLL
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_3.exearnatic_3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe4⤵
- Loads dropped DLL
PID:592 -
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_6.exearnatic_6.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304 -
C:\Users\Admin\Documents\n5JlJK2WbNYqBaytfGrhLLuH.exe"C:\Users\Admin\Documents\n5JlJK2WbNYqBaytfGrhLLuH.exe"6⤵PID:2056
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"7⤵PID:2320
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 2928⤵
- Program crash
PID:2972
-
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:1956
-
-
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"7⤵PID:2324
-
-
-
C:\Users\Admin\Documents\yAM0KH4N0vZkjPzwXyMRRtQ5.exe"C:\Users\Admin\Documents\yAM0KH4N0vZkjPzwXyMRRtQ5.exe"6⤵PID:1744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --hold https://ezsearch.ru7⤵PID:2128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6994f50,0x7fef6994f60,0x7fef6994f708⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1208,13006148477837023545,619011299553369520,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1220 /prefetch:28⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1208,13006148477837023545,619011299553369520,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1344 /prefetch:88⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1208,13006148477837023545,619011299553369520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 /prefetch:88⤵PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1208,13006148477837023545,619011299553369520,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1608 /prefetch:28⤵PID:648
-
-
-
-
C:\Users\Admin\Documents\UgQiqY2ksPp5YaepPlQf0dGd.exe"C:\Users\Admin\Documents\UgQiqY2ksPp5YaepPlQf0dGd.exe"6⤵PID:968
-
-
C:\Users\Admin\Documents\LJVFd63Ru8po9MpWI0rDQAce.exe"C:\Users\Admin\Documents\LJVFd63Ru8po9MpWI0rDQAce.exe"6⤵PID:2068
-
C:\Users\Admin\Documents\LJVFd63Ru8po9MpWI0rDQAce.exeC:\Users\Admin\Documents\LJVFd63Ru8po9MpWI0rDQAce.exe7⤵PID:2408
-
-
-
C:\Users\Admin\Documents\FlRLlBNxlvi8sACLMz8oHFmC.exe"C:\Users\Admin\Documents\FlRLlBNxlvi8sACLMz8oHFmC.exe"6⤵PID:2144
-
-
C:\Users\Admin\Documents\PUhItonckYlT1aRnEUlOUlkr.exe"C:\Users\Admin\Documents\PUhItonckYlT1aRnEUlOUlkr.exe"6⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 9527⤵
- Program crash
PID:3056
-
-
-
C:\Users\Admin\Documents\D4tc74IyRZGAl6gsPbWwA61h.exe"C:\Users\Admin\Documents\D4tc74IyRZGAl6gsPbWwA61h.exe"6⤵PID:2096
-
-
C:\Users\Admin\Documents\i4m_YYMLpBj55oL5hYpxUZ6M.exe"C:\Users\Admin\Documents\i4m_YYMLpBj55oL5hYpxUZ6M.exe"6⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 9567⤵
- Program crash
PID:1684
-
-
-
C:\Users\Admin\Documents\iv38u3vitO54MyqcnVi5ITMw.exe"C:\Users\Admin\Documents\iv38u3vitO54MyqcnVi5ITMw.exe"6⤵PID:2080
-
-
C:\Users\Admin\Documents\HciXxtUZs7W50HCnM3bnavOG.exe"C:\Users\Admin\Documents\HciXxtUZs7W50HCnM3bnavOG.exe"6⤵PID:2208
-
C:\Users\Admin\Documents\HciXxtUZs7W50HCnM3bnavOG.exeC:\Users\Admin\Documents\HciXxtUZs7W50HCnM3bnavOG.exe7⤵PID:2396
-
-
-
C:\Users\Admin\Documents\KeCG06xYbamW7t6Brl6XYILu.exe"C:\Users\Admin\Documents\KeCG06xYbamW7t6Brl6XYILu.exe"6⤵PID:2200
-
-
C:\Users\Admin\Documents\gU0gqbr2b7xMrhHL8NdZ0wcM.exe"C:\Users\Admin\Documents\gU0gqbr2b7xMrhHL8NdZ0wcM.exe"6⤵PID:2172
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub7⤵PID:1584
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe4⤵
- Loads dropped DLL
PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_7.exe1⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\7zSCA4C9954\arnatic_7.exearnatic_7.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub1⤵PID:648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\D1B1.exeC:\Users\Admin\AppData\Local\Temp\D1B1.exe1⤵PID:688