Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
setup_x86_...0).exe
windows7_x64
setup_x86_...0).exe
windows10_x64
10setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
10setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
setup_x86_...4).exe
windows7_x64
setup_x86_...4).exe
windows10_x64
setup_x86_...5).exe
windows7_x64
setup_x86_...5).exe
windows10_x64
10setup_x86_...6).exe
windows7_x64
setup_x86_...6).exe
windows10_x64
10setup_x86_...7).exe
windows7_x64
setup_x86_...7).exe
windows10_x64
setup_x86_...8).exe
windows7_x64
setup_x86_...8).exe
windows10_x64
10setup_x86_...9).exe
windows7_x64
10setup_x86_...9).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...0).exe
windows7_x64
10setup_x86_...0).exe
windows10_x64
10setup_x86_...1).exe
windows7_x64
setup_x86_...1).exe
windows10_x64
setup_x86_...2).exe
windows7_x64
setup_x86_...2).exe
windows10_x64
setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10setup_x86_...3).exe
windows7_x64
setup_x86_...3).exe
windows10_x64
10Resubmissions
11/07/2024, 05:43
240711-gej4lstgrf 1006/09/2021, 14:13
210906-rjpvrsedbm 1008/07/2021, 11:08
210708-4gztl3mwl6 1008/07/2021, 08:02
210708-klfb4qeda6 1007/07/2021, 09:39
210707-nem57xyvf2 1006/07/2021, 17:51
210706-7pcrmjy3fa 1006/07/2021, 13:45
210706-eybelwcq86 10Analysis
-
max time kernel
13s -
max time network
335s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07/07/2021, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install - копия (10).exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
setup_x86_x64_install - копия (10).exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
setup_x86_x64_install - копия (11).exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
setup_x86_x64_install - копия (11).exe
Resource
win10v20210408
Behavioral task
behavioral5
Sample
setup_x86_x64_install - копия (12).exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
setup_x86_x64_install - копия (12).exe
Resource
win10v20210408
Behavioral task
behavioral7
Sample
setup_x86_x64_install - копия (13).exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
setup_x86_x64_install - копия (13).exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
setup_x86_x64_install - копия (14).exe
Resource
win7v20210408
Behavioral task
behavioral10
Sample
setup_x86_x64_install - копия (14).exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
setup_x86_x64_install - копия (15).exe
Resource
win7v20210408
Behavioral task
behavioral12
Sample
setup_x86_x64_install - копия (15).exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
setup_x86_x64_install - копия (16).exe
Resource
win7v20210408
Behavioral task
behavioral14
Sample
setup_x86_x64_install - копия (16).exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
setup_x86_x64_install - копия (17).exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
setup_x86_x64_install - копия (17).exe
Resource
win10v20210408
Behavioral task
behavioral17
Sample
setup_x86_x64_install - копия (18).exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
setup_x86_x64_install - копия (18).exe
Resource
win10v20210408
Behavioral task
behavioral19
Sample
setup_x86_x64_install - копия (19).exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
setup_x86_x64_install - копия (19).exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
setup_x86_x64_install - копия (2).exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
setup_x86_x64_install - копия (2).exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
setup_x86_x64_install - копия (20).exe
Resource
win7v20210408
Behavioral task
behavioral24
Sample
setup_x86_x64_install - копия (20).exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
setup_x86_x64_install - копия (21).exe
Resource
win7v20210408
Behavioral task
behavioral26
Sample
setup_x86_x64_install - копия (21).exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
setup_x86_x64_install - копия (22).exe
Resource
win7v20210408
Behavioral task
behavioral28
Sample
setup_x86_x64_install - копия (22).exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
setup_x86_x64_install - копия (23).exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
setup_x86_x64_install - копия (23).exe
Resource
win10v20210408
Behavioral task
behavioral31
Sample
setup_x86_x64_install - копия (3).exe
Resource
win7v20210410
Errors
General
-
Target
setup_x86_x64_install - копия (16).exe
-
Size
3.2MB
-
MD5
3ae1c212119919e5fce71247286f8e0e
-
SHA1
97c1890ab73c539056f95eafede319df774e9d38
-
SHA256
30c2f230e5401b4b1ea8fb425dadf4e453575884303b9fa2066e6a91859f016e
-
SHA512
5bb28a775c10b8b68b8c448d64287ca732d0af5577ecc4348a89934358440bb4ff6958115f14ecbabb0446d234d6f621afa3419daa4aec6c03c0af9b6a3b1558
Malware Config
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com
-
profile_id
706
Extracted
redline
ServAni
87.251.71.195:82
Extracted
smokeloader
2020
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 8 IoCs
resource yara_rule behavioral13/memory/1408-183-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral13/memory/2748-255-0x0000000000418392-mapping.dmp family_redline behavioral13/memory/2760-253-0x0000000000417E8E-mapping.dmp family_redline behavioral13/memory/3012-258-0x0000000000417E4A-mapping.dmp family_redline behavioral13/memory/1388-260-0x0000000000417E82-mapping.dmp family_redline behavioral13/memory/1672-263-0x0000000000417E9A-mapping.dmp family_redline behavioral13/memory/1340-266-0x0000000000417E8A-mapping.dmp family_redline behavioral13/memory/3064-271-0x0000000000417E82-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral13/memory/1664-168-0x0000000002320000-0x00000000023BD000-memory.dmp family_vidar behavioral13/memory/1664-169-0x0000000000400000-0x0000000000949000-memory.dmp family_vidar -
resource yara_rule behavioral13/files/0x00030000000130e4-68.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-69.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-70.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-72.dat aspack_v212_v242 behavioral13/files/0x00030000000130de-73.dat aspack_v212_v242 behavioral13/files/0x00030000000130de-74.dat aspack_v212_v242 behavioral13/files/0x00030000000130dd-75.dat aspack_v212_v242 behavioral13/files/0x00030000000130dd-76.dat aspack_v212_v242 behavioral13/files/0x00030000000130e1-81.dat aspack_v212_v242 behavioral13/files/0x00030000000130e1-82.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-87.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-86.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-85.dat aspack_v212_v242 behavioral13/files/0x00030000000130e4-84.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 1740 setup_installer.exe 1156 setup_install.exe 1620 arnatic_2.exe 1664 arnatic_1.exe 1340 arnatic_3.exe 1932 arnatic_6.exe 1996 arnatic_5.exe 1644 arnatic_7.exe -
Loads dropped DLL 34 IoCs
pid Process 1248 setup_x86_x64_install - копия (16).exe 1740 setup_installer.exe 1740 setup_installer.exe 1740 setup_installer.exe 1740 setup_installer.exe 1740 setup_installer.exe 1740 setup_installer.exe 1156 setup_install.exe 1156 setup_install.exe 1156 setup_install.exe 1156 setup_install.exe 1156 setup_install.exe 1156 setup_install.exe 1156 setup_install.exe 1156 setup_install.exe 552 cmd.exe 552 cmd.exe 2036 cmd.exe 592 cmd.exe 2036 cmd.exe 1620 arnatic_2.exe 1620 arnatic_2.exe 1576 cmd.exe 1664 arnatic_1.exe 1664 arnatic_1.exe 1340 arnatic_3.exe 1340 arnatic_3.exe 1932 arnatic_6.exe 1932 arnatic_6.exe 368 cmd.exe 336 cmd.exe 336 cmd.exe 1644 arnatic_7.exe 1644 arnatic_7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 178 checkip.amazonaws.com 199 api.2ip.ua 204 api.2ip.ua 21 ipinfo.io 23 ipinfo.io 101 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2088 1664 WerFault.exe 43 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 arnatic_5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1248 wrote to memory of 1740 1248 setup_x86_x64_install - копия (16).exe 29 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1740 wrote to memory of 1156 1740 setup_installer.exe 30 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 2036 1156 setup_install.exe 32 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 552 1156 setup_install.exe 33 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 592 1156 setup_install.exe 34 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 768 1156 setup_install.exe 35 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 368 1156 setup_install.exe 44 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 1576 1156 setup_install.exe 36 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 1156 wrote to memory of 336 1156 setup_install.exe 37 PID 552 wrote to memory of 1620 552 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (16).exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install - копия (16).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCC611735\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_1.exe4⤵
- Loads dropped DLL
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_1.exearnatic_1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 9646⤵
- Program crash
PID:2088
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_2.exe4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_2.exearnatic_2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_3.exe4⤵
- Loads dropped DLL
PID:592 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_3.exearnatic_3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Windows\SysWOW64\rUNdlL32.eXe"C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub6⤵PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_4.exe4⤵PID:768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_6.exe4⤵
- Loads dropped DLL
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_6.exearnatic_6.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932 -
C:\Users\Admin\Documents\8rHAHPg0RZSho2Wfl39tMlwd.exe"C:\Users\Admin\Documents\8rHAHPg0RZSho2Wfl39tMlwd.exe"6⤵PID:2160
-
C:\Users\Admin\Documents\8rHAHPg0RZSho2Wfl39tMlwd.exeC:\Users\Admin\Documents\8rHAHPg0RZSho2Wfl39tMlwd.exe7⤵PID:1672
-
-
-
C:\Users\Admin\Documents\ANwcoAjqlvyd0C_rNknMgzAz.exe"C:\Users\Admin\Documents\ANwcoAjqlvyd0C_rNknMgzAz.exe"6⤵PID:2152
-
C:\Users\Admin\Documents\ANwcoAjqlvyd0C_rNknMgzAz.exeC:\Users\Admin\Documents\ANwcoAjqlvyd0C_rNknMgzAz.exe7⤵PID:3012
-
-
-
C:\Users\Admin\Documents\EzuEXS8dApB3BE6Hc9FiRIij.exe"C:\Users\Admin\Documents\EzuEXS8dApB3BE6Hc9FiRIij.exe"6⤵PID:2220
-
-
C:\Users\Admin\Documents\uoLOl1_DPUSYcPJYVctdRbDj.exe"C:\Users\Admin\Documents\uoLOl1_DPUSYcPJYVctdRbDj.exe"6⤵PID:2544
-
C:\Program Files (x86)\Company\NewProduct\file4.exe"C:\Program Files (x86)\Company\NewProduct\file4.exe"7⤵PID:2784
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵PID:552
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"8⤵PID:3064
-
-
-
C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"C:\Program Files (x86)\Company\NewProduct\jingzhang.exe"7⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\jingzhang.exe"C:\Users\Admin\AppData\Local\Temp\jingzhang.exe" end8⤵PID:848
-
-
-
-
C:\Users\Admin\Documents\tELAXCDhYWTYngRcwTH3uhCt.exe"C:\Users\Admin\Documents\tELAXCDhYWTYngRcwTH3uhCt.exe"6⤵PID:2528
-
-
C:\Users\Admin\Documents\FmrxAUD7PaWX0TD8pqNfEA_x.exe"C:\Users\Admin\Documents\FmrxAUD7PaWX0TD8pqNfEA_x.exe"6⤵PID:2520
-
-
C:\Users\Admin\Documents\6C8NDRa8ZWASrOlnlvknaTUg.exe"C:\Users\Admin\Documents\6C8NDRa8ZWASrOlnlvknaTUg.exe"6⤵PID:2508
-
-
C:\Users\Admin\Documents\xaVcIaLMcKnT2dO7G3NwYmcG.exe"C:\Users\Admin\Documents\xaVcIaLMcKnT2dO7G3NwYmcG.exe"6⤵PID:2488
-
C:\Users\Admin\Documents\xaVcIaLMcKnT2dO7G3NwYmcG.exeC:\Users\Admin\Documents\xaVcIaLMcKnT2dO7G3NwYmcG.exe7⤵PID:2760
-
-
-
C:\Users\Admin\Documents\QnAbSgUdfbQUZeTig9XKpwMC.exe"C:\Users\Admin\Documents\QnAbSgUdfbQUZeTig9XKpwMC.exe"6⤵PID:2480
-
C:\Users\Admin\Documents\QnAbSgUdfbQUZeTig9XKpwMC.exe"C:\Users\Admin\Documents\QnAbSgUdfbQUZeTig9XKpwMC.exe"7⤵PID:2392
-
-
-
C:\Users\Admin\Documents\nPx9XUpu4wfDkQ84NXgdjCjP.exe"C:\Users\Admin\Documents\nPx9XUpu4wfDkQ84NXgdjCjP.exe"6⤵PID:2468
-
-
C:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exe"C:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exe"6⤵PID:2456
-
C:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exeC:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exe7⤵PID:2560
-
-
C:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exeC:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exe7⤵PID:2052
-
-
C:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exeC:\Users\Admin\Documents\dG_gnxlGwCE37YtnuZUL_NnV.exe7⤵PID:1340
-
-
-
C:\Users\Admin\Documents\6JdRrULdl615P4V6dWqSKsZG.exe"C:\Users\Admin\Documents\6JdRrULdl615P4V6dWqSKsZG.exe"6⤵PID:2444
-
C:\Users\Admin\Documents\6JdRrULdl615P4V6dWqSKsZG.exeC:\Users\Admin\Documents\6JdRrULdl615P4V6dWqSKsZG.exe7⤵PID:2748
-
-
-
C:\Users\Admin\Documents\6PQ7smpL4Jpu3HZ4SezCuRQD.exe"C:\Users\Admin\Documents\6PQ7smpL4Jpu3HZ4SezCuRQD.exe"6⤵PID:2428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --hold https://ezsearch.ru7⤵PID:2568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6574f50,0x7fef6574f60,0x7fef6574f708⤵PID:748
-
-
-
-
C:\Users\Admin\Documents\YpljaBR9fxsT2L_garcTGle0.exe"C:\Users\Admin\Documents\YpljaBR9fxsT2L_garcTGle0.exe"6⤵PID:2416
-
-
C:\Users\Admin\Documents\BXAGJ5fYenXzHBXFbPxj_xJT.exe"C:\Users\Admin\Documents\BXAGJ5fYenXzHBXFbPxj_xJT.exe"6⤵PID:2640
-
-
C:\Users\Admin\Documents\DTXymH9Dym3rQUFvOEQ3b1Qn.exe"C:\Users\Admin\Documents\DTXymH9Dym3rQUFvOEQ3b1Qn.exe"6⤵PID:2628
-
C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"7⤵PID:2844
-
C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"8⤵PID:2308
-
-
C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"8⤵PID:1344
-
-
C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"C:\Program Files (x86)\Browzar\MrGh6bEH0L0a.exe"8⤵PID:1388
-
-
-
C:\Program Files (x86)\Browzar\Browzar.exe"C:\Program Files (x86)\Browzar\Browzar.exe"7⤵PID:2916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_7.exe4⤵
- Loads dropped DLL
PID:336 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_7.exearnatic_7.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_7.exeC:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_7.exe6⤵PID:1408
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c arnatic_5.exe4⤵
- Loads dropped DLL
PID:368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCC611735\arnatic_5.exearnatic_5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Users\Admin\AppData\Roaming\6288597.exe"C:\Users\Admin\AppData\Roaming\6288597.exe"2⤵PID:2024
-
-
C:\Users\Admin\AppData\Roaming\4229161.exe"C:\Users\Admin\AppData\Roaming\4229161.exe"2⤵PID:700
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵PID:528
-
-
-
C:\Users\Admin\AppData\Roaming\7325701.exe"C:\Users\Admin\AppData\Roaming\7325701.exe"2⤵PID:1792
-
-
C:\Users\Admin\AppData\Roaming\2614852.exe"C:\Users\Admin\AppData\Roaming\2614852.exe"2⤵PID:1472
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService1⤵PID:1892
-
C:\Windows\system32\taskeng.exetaskeng.exe {893BAD95-1048-42B1-A2D2-E55D965A7A8A} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵PID:2992
-
C:\Users\Admin\AppData\Roaming\vcbgjguC:\Users\Admin\AppData\Roaming\vcbgjgu2⤵PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\EC33.exeC:\Users\Admin\AppData\Local\Temp\EC33.exe1⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\EC33.exeC:\Users\Admin\AppData\Local\Temp\EC33.exe2⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\22ED.exeC:\Users\Admin\AppData\Local\Temp\22ED.exe1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\24A2.exeC:\Users\Admin\AppData\Local\Temp\24A2.exe1⤵PID:2480