Overview
overview
10Static
static
setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
setup_x86_...4).exe
windows7_x64
setup_x86_...4).exe
windows10_x64
setup_x86_...5).exe
windows7_x64
setup_x86_...5).exe
windows10_x64
setup_x86_...6).exe
windows7_x64
setup_x86_...6).exe
windows10_x64
setup_x86_...7).exe
windows7_x64
setup_x86_...7).exe
windows10_x64
setup_x86_...8).exe
windows7_x64
setup_x86_...8).exe
windows10_x64
setup_x86_...9).exe
windows7_x64
10setup_x86_...9).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
10setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
10setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
10setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10Resubmissions
11-07-2024 05:43
240711-gej4lstgrf 1006-09-2021 14:13
210906-rjpvrsedbm 1008-07-2021 11:08
210708-4gztl3mwl6 1008-07-2021 08:02
210708-klfb4qeda6 1007-07-2021 09:39
210707-nem57xyvf2 1006-07-2021 17:51
210706-7pcrmjy3fa 1006-07-2021 13:45
210706-eybelwcq86 10Analysis
-
max time kernel
19s -
max time network
333s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
02-07-2021 07:35
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install - копия (10).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
setup_x86_x64_install - копия (10).exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
setup_x86_x64_install - копия (11).exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
setup_x86_x64_install - копия (11).exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
setup_x86_x64_install - копия (12).exe
Resource
win7v20210408
Behavioral task
behavioral6
Sample
setup_x86_x64_install - копия (12).exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
setup_x86_x64_install - копия (13).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
setup_x86_x64_install - копия (13).exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
setup_x86_x64_install - копия (14).exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
setup_x86_x64_install - копия (14).exe
Resource
win10v20210408
Behavioral task
behavioral11
Sample
setup_x86_x64_install - копия (15).exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
setup_x86_x64_install - копия (15).exe
Resource
win10v20210408
Behavioral task
behavioral13
Sample
setup_x86_x64_install - копия (16).exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
setup_x86_x64_install - копия (16).exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
setup_x86_x64_install - копия (17).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
setup_x86_x64_install - копия (17).exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
setup_x86_x64_install - копия (18).exe
Resource
win7v20210408
Behavioral task
behavioral18
Sample
setup_x86_x64_install - копия (18).exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
setup_x86_x64_install - копия (19).exe
Resource
win7v20210408
Behavioral task
behavioral20
Sample
setup_x86_x64_install - копия (19).exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
setup_x86_x64_install - копия (2).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
setup_x86_x64_install - копия (2).exe
Resource
win10v20210408
Behavioral task
behavioral23
Sample
setup_x86_x64_install - копия (20).exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
setup_x86_x64_install - копия (20).exe
Resource
win10v20210408
Behavioral task
behavioral25
Sample
setup_x86_x64_install - копия (21).exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
setup_x86_x64_install - копия (21).exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
setup_x86_x64_install - копия (22).exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
setup_x86_x64_install - копия (22).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
setup_x86_x64_install - копия (23).exe
Resource
win7v20210408
Behavioral task
behavioral30
Sample
setup_x86_x64_install - копия (23).exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
setup_x86_x64_install - копия (3).exe
Resource
win7v20210408
Errors
General
-
Target
setup_x86_x64_install - копия (14).exe
-
Size
3.2MB
-
MD5
3ae1c212119919e5fce71247286f8e0e
-
SHA1
97c1890ab73c539056f95eafede319df774e9d38
-
SHA256
30c2f230e5401b4b1ea8fb425dadf4e453575884303b9fa2066e6a91859f016e
-
SHA512
5bb28a775c10b8b68b8c448d64287ca732d0af5577ecc4348a89934358440bb4ff6958115f14ecbabb0446d234d6f621afa3419daa4aec6c03c0af9b6a3b1558
Malware Config
Extracted
redline
ServAni
87.251.71.195:82
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Extracted
redline
PROLIV_02.06.2021
45.144.29.182:19066
Extracted
redline
02_07_r
rdanoriran.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
resource yara_rule behavioral9/memory/1068-169-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/1068-170-0x0000000000417F26-mapping.dmp family_redline behavioral9/memory/1068-173-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2408-225-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2424-228-0x0000000000417E3A-mapping.dmp family_redline behavioral9/memory/2408-232-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2424-231-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2424-224-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral9/memory/2408-227-0x0000000000417E6A-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 6 IoCs
resource yara_rule behavioral9/memory/932-179-0x00000000022E0000-0x000000000237D000-memory.dmp Vidar behavioral9/memory/932-180-0x0000000000400000-0x0000000000949000-memory.dmp Vidar behavioral9/memory/2064-217-0x00000000045C0000-0x000000000465D000-memory.dmp Vidar behavioral9/memory/2116-242-0x0000000004920000-0x00000000049BD000-memory.dmp Vidar behavioral9/memory/2116-243-0x0000000000400000-0x000000000442B000-memory.dmp Vidar behavioral9/memory/2064-218-0x0000000000400000-0x0000000004429000-memory.dmp Vidar -
resource yara_rule behavioral9/files/0x0003000000013119-68.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-69.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-70.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-72.dat aspack_v212_v242 behavioral9/files/0x000300000001310f-73.dat aspack_v212_v242 behavioral9/files/0x000300000001310f-74.dat aspack_v212_v242 behavioral9/files/0x000300000001310e-75.dat aspack_v212_v242 behavioral9/files/0x000300000001310e-76.dat aspack_v212_v242 behavioral9/files/0x0003000000013111-81.dat aspack_v212_v242 behavioral9/files/0x0003000000013111-82.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-87.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-86.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-84.dat aspack_v212_v242 behavioral9/files/0x0003000000013119-85.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 1280 setup_installer.exe 1400 setup_install.exe 456 arnatic_2.exe 1544 arnatic_4.exe 932 arnatic_1.exe 848 arnatic_7.exe 1528 arnatic_6.exe 868 jfiag3g_gg.exe -
resource yara_rule behavioral9/files/0x000300000001311b-157.dat upx behavioral9/files/0x000300000001311b-159.dat upx behavioral9/files/0x000300000001311b-156.dat upx behavioral9/files/0x000300000001311b-161.dat upx behavioral9/files/0x000300000001311b-163.dat upx behavioral9/files/0x000300000001311b-162.dat upx -
Loads dropped DLL 39 IoCs
pid Process 1636 setup_x86_x64_install - копия (14).exe 1280 setup_installer.exe 1280 setup_installer.exe 1280 setup_installer.exe 1280 setup_installer.exe 1280 setup_installer.exe 1280 setup_installer.exe 1400 setup_install.exe 1400 setup_install.exe 1400 setup_install.exe 1400 setup_install.exe 1400 setup_install.exe 1400 setup_install.exe 1400 setup_install.exe 1400 setup_install.exe 1040 cmd.exe 1656 cmd.exe 1656 cmd.exe 1628 cmd.exe 1628 cmd.exe 456 arnatic_2.exe 456 arnatic_2.exe 1868 cmd.exe 1544 arnatic_4.exe 1544 arnatic_4.exe 1868 cmd.exe 912 cmd.exe 932 arnatic_1.exe 932 arnatic_1.exe 848 arnatic_7.exe 848 arnatic_7.exe 1528 arnatic_6.exe 1528 arnatic_6.exe 1544 arnatic_4.exe 1544 arnatic_4.exe 868 jfiag3g_gg.exe 868 jfiag3g_gg.exe 848 arnatic_7.exe 456 arnatic_2.exe -
resource yara_rule behavioral9/memory/1348-195-0x0000000000AD0000-0x0000000000AD1000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com 16 ipinfo.io 17 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 2340 932 WerFault.exe 34 2248 2220 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI arnatic_2.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3656 timeout.exe 3484 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 3364 taskkill.exe 3584 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 456 arnatic_2.exe 456 arnatic_2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1636 wrote to memory of 1280 1636 setup_x86_x64_install - копия (14).exe 26 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1280 wrote to memory of 1400 1280 setup_installer.exe 27 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1628 1400 setup_install.exe 29 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 1656 1400 setup_install.exe 44 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 368 1400 setup_install.exe 43 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 1040 1400 setup_install.exe 42 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 536 1400 setup_install.exe 41 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 912 1400 setup_install.exe 39 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1400 wrote to memory of 1868 1400 setup_install.exe 37 PID 1040 wrote to memory of 1544 1040 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (14).exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (14).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS005981C4\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe4⤵
- Loads dropped DLL
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_1.exearnatic_1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10006⤵
- Program crash
PID:2340
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe4⤵
- Loads dropped DLL
PID:1868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe4⤵
- Loads dropped DLL
PID:912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe4⤵PID:536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe4⤵PID:368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe4⤵
- Loads dropped DLL
PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_6.exearnatic_6.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\Documents\Cj5qeu1THNpqgFAr23_EkiGK.exe"C:\Users\Admin\Documents\Cj5qeu1THNpqgFAr23_EkiGK.exe"2⤵PID:968
-
-
C:\Users\Admin\Documents\iaT3YcMOdhc1c90bMYO4uTaV.exe"C:\Users\Admin\Documents\iaT3YcMOdhc1c90bMYO4uTaV.exe"2⤵PID:1964
-
C:\Users\Admin\Documents\iaT3YcMOdhc1c90bMYO4uTaV.exeC:\Users\Admin\Documents\iaT3YcMOdhc1c90bMYO4uTaV.exe3⤵PID:2424
-
-
-
C:\Users\Admin\Documents\Rk8Lfa_3rANyCXctXedSqH9N.exe"C:\Users\Admin\Documents\Rk8Lfa_3rANyCXctXedSqH9N.exe"2⤵PID:1252
-
-
C:\Users\Admin\Documents\bYSBiSQJ9rK3CwQG6j2EkyC4.exe"C:\Users\Admin\Documents\bYSBiSQJ9rK3CwQG6j2EkyC4.exe"2⤵PID:2056
-
-
C:\Users\Admin\Documents\wf2VFXIpE3IrIofiAF69NIE9.exe"C:\Users\Admin\Documents\wf2VFXIpE3IrIofiAF69NIE9.exe"2⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im wf2VFXIpE3IrIofiAF69NIE9.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\wf2VFXIpE3IrIofiAF69NIE9.exe" & del C:\ProgramData\*.dll & exit3⤵PID:3316
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im wf2VFXIpE3IrIofiAF69NIE9.exe /f4⤵
- Kills process with taskkill
PID:3364
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:3484
-
-
-
-
C:\Users\Admin\Documents\Xt0Iojn2eBzvwuD69IzBkr_P.exe"C:\Users\Admin\Documents\Xt0Iojn2eBzvwuD69IzBkr_P.exe"2⤵PID:1348
-
-
C:\Users\Admin\Documents\eA0F6q5YMAjbFhcxNNiuKKxf.exe"C:\Users\Admin\Documents\eA0F6q5YMAjbFhcxNNiuKKxf.exe"2⤵PID:820
-
C:\Users\Admin\Documents\eA0F6q5YMAjbFhcxNNiuKKxf.exe"{path}"3⤵PID:2208
-
-
C:\Users\Admin\Documents\eA0F6q5YMAjbFhcxNNiuKKxf.exe"{path}"3⤵PID:2304
-
-
-
C:\Users\Admin\Documents\cGPZMpw3NCM4_A0OtCnqLSM0.exe"C:\Users\Admin\Documents\cGPZMpw3NCM4_A0OtCnqLSM0.exe"2⤵PID:1344
-
C:\Users\Admin\Documents\cGPZMpw3NCM4_A0OtCnqLSM0.exeC:\Users\Admin\Documents\cGPZMpw3NCM4_A0OtCnqLSM0.exe3⤵PID:2408
-
-
-
C:\Users\Admin\Documents\y3y9XDAsw1PZAeh8nneLwKSV.exe"C:\Users\Admin\Documents\y3y9XDAsw1PZAeh8nneLwKSV.exe"2⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im y3y9XDAsw1PZAeh8nneLwKSV.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\Documents\y3y9XDAsw1PZAeh8nneLwKSV.exe" & del C:\ProgramData\*.dll & exit3⤵PID:3536
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im y3y9XDAsw1PZAeh8nneLwKSV.exe /f4⤵
- Kills process with taskkill
PID:3584
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:3656
-
-
-
-
C:\Users\Admin\Documents\f_khdhxUZFtvxyw4GoAlxKB_.exe"C:\Users\Admin\Documents\f_khdhxUZFtvxyw4GoAlxKB_.exe"2⤵PID:2104
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"3⤵PID:3368
-
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"3⤵PID:3152
-
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",shl4⤵PID:2228
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵PID:2220
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵PID:2476
-
-
-
-
C:\Users\Admin\Documents\zBJM5_iqyBaUbwg6UlHUr0bi.exe"C:\Users\Admin\Documents\zBJM5_iqyBaUbwg6UlHUr0bi.exe"2⤵PID:2168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --hold https://ezsearch.ru3⤵PID:2288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1120 /prefetch:24⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1540 /prefetch:84⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1560 /prefetch:84⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1976 /prefetch:14⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:14⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2488 /prefetch:14⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:14⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:14⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:84⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2368 /prefetch:14⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2752 /prefetch:24⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:84⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 /prefetch:84⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1876 /prefetch:84⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:84⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3288 /prefetch:84⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4676 /prefetch:84⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1896 /prefetch:84⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings4⤵PID:3292
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x13c,0x140,0x144,0x110,0x148,0x13fbaa890,0x13fbaa8a0,0x13fbaa8b05⤵PID:2256
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4652 /prefetch:84⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16283609539283265817,4234860506337105124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1448 /prefetch:84⤵PID:4064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_7.exearnatic_7.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_7.exe2⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_2.exearnatic_2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:456
-
C:\Users\Admin\AppData\Local\Temp\7zS005981C4\arnatic_4.exearnatic_4.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6994f50,0x7fef6994f60,0x7fef6994f701⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt1⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2921⤵
- Program crash
PID:2248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:2860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\91B5.exeC:\Users\Admin\AppData\Local\Temp\91B5.exe1⤵PID:3684