Analysis
-
max time kernel
348s -
max time network
347s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 04:24
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Kangaroo Patcher.exeKangaroo Patcher.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Kangaroo Patcher.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Kangaroo Patcher.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Kangaroo Patcher.exeKangaroo Patcher.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Kangaroo Patcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Kangaroo Patcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Kangaroo Patcher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Kangaroo Patcher.exe -
Executes dropped EXE 5 IoCs
Processes:
EntropyV3.exeEntropyV3.exeKangaroo Patcher.exeKangaroo Patcher.exeentropy.exepid process 5480 EntropyV3.exe 2456 EntropyV3.exe 4180 Kangaroo Patcher.exe 4576 Kangaroo Patcher.exe 3248 entropy.exe -
Loads dropped DLL 1 IoCs
Processes:
entropy.exepid process 3248 entropy.exe -
Processes:
resource yara_rule C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe themida C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe themida behavioral1/memory/4180-602-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmp themida behavioral1/memory/4180-603-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmp themida C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe themida behavioral1/memory/4576-605-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmp themida behavioral1/memory/4576-611-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmp themida behavioral1/memory/4576-612-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exe vmprotect C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exe vmprotect behavioral1/memory/3248-615-0x00007FF7F1540000-0x00007FF7F24C3000-memory.dmp vmprotect -
Processes:
Kangaroo Patcher.exeKangaroo Patcher.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Kangaroo Patcher.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Kangaroo Patcher.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
EntropyV3.exeEntropyV3.exeKangaroo Patcher.exeKangaroo Patcher.exeentropy.exepid process 5480 EntropyV3.exe 2456 EntropyV3.exe 4180 Kangaroo Patcher.exe 4576 Kangaroo Patcher.exe 3248 entropy.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4084 2552 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133232451193927886" chrome.exe -
Modifies registry class 2 IoCs
Processes:
chrome.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exeEntropyV3.exechrome.exeEntropyV3.exeentropy.exetaskmgr.exepid process 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 5480 EntropyV3.exe 5480 EntropyV3.exe 5976 chrome.exe 5976 chrome.exe 2456 EntropyV3.exe 2456 EntropyV3.exe 3248 entropy.exe 3248 entropy.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
OpenWith.exeentropy.exetaskmgr.exepid process 836 OpenWith.exe 3248 entropy.exe 5280 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 29 IoCs
Processes:
chrome.exepid process 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe Token: SeShutdownPrivilege 2164 chrome.exe Token: SeCreatePagefilePrivilege 2164 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 2164 chrome.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe 5280 taskmgr.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
OpenWith.exeEntropyV3.exeEntropyV3.exeKangaroo Patcher.exeKangaroo Patcher.exeentropy.exepid process 836 OpenWith.exe 836 OpenWith.exe 836 OpenWith.exe 836 OpenWith.exe 836 OpenWith.exe 836 OpenWith.exe 836 OpenWith.exe 5480 EntropyV3.exe 2456 EntropyV3.exe 4180 Kangaroo Patcher.exe 4576 Kangaroo Patcher.exe 3248 entropy.exe 3248 entropy.exe 3248 entropy.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2164 wrote to memory of 1472 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 1472 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 4388 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 3572 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 3572 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe PID 2164 wrote to memory of 644 2164 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.mediafire.com/file/bkv59z08u5assyw/Entropy.zip/file1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffc716c9758,0x7ffc716c9768,0x7ffc716c97782⤵PID:1472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:22⤵PID:4388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:3572
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:644
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3192 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:628
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4880 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:4180
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5228 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5836 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3248 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:320
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5468 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4876 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3472
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5232 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:1756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=6224 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:2672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:1388
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6000 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:1168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:2112
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1668 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:4520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=6136 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:2136
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4908 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:1884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=6112 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:2688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4996 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5428 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:1328
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6076 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:964
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=6684 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:1656
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4672 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:2612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=908 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:4300
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=2780 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3600
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=5028 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:1368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=6520 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=3288 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:4836
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6964 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:3088
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=7200 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:4504
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=6116 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:5708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=6484 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:5728
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6700 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=7436 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:6068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=6976 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:12⤵PID:5168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7704 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:5228
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7720 --field-trial-handle=1904,i,11149494844759114672,14506750260989778047,131072 /prefetch:82⤵PID:3600
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:980
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3000
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 368 -p 2552 -ip 25521⤵PID:2376
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2552 -s 17641⤵
- Program crash
PID:4084
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Entropy\" -ad -an -ai#7zMap9713:76:7zEvent299771⤵PID:4140
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Entropy\Entropy again\" -ad -an -ai#7zMap12918:104:7zEvent108691⤵PID:2116
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:836
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\" -ad -an -ai#7zMap25359:124:7zEvent123191⤵PID:5096
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exe"C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5480
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exe"C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exe" "C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\Entropy Patcher.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\READ ME.txt1⤵PID:5544
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe"C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4180
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe"C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exe" "C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4576 -
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exe"C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3248
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:5280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5725dfadacd7b746ba806f956314d8daf
SHA1a217932961c1c5e788d3e2ec98f0451431d564a3
SHA2565b496c58006f91bd0a1b1c08789fcf0415cf2ff1c0ed2044e9dd0f0a7d29679c
SHA512ab63cfcd15058ddef4623d6da2e286658a5d225e31261a55829b1a4d77b92d91dc18d02cd71a5c0bab2d2a395a1d7aa91194764c3eb3fe6b2632e25002c9c8c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
552B
MD563f76bac4e2f9682174727d5718a2701
SHA15b9c7cc9b57aaa67e1a0a6e20a8140f0dc4195b6
SHA25625be115b2f388e0c419f8e9e4d80b8fd486ebaad81e7725c128266394019698e
SHA5127bec68af0dd7d76f360e7fb3734aa149688973933187ee862b2102ba9e52c6aef4fc58ff17ecde2a8be93f0c116c94e4352b99e3483c2e9f99f14ecee57d6abf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
600B
MD59705702a2f4d9f28ae563a512888c71e
SHA11f4b7bf72e06c998c10e7cea653178c6fac390d6
SHA256e756cc267d9403e86ef5c6270f5a255b15bc4b34544fd0badda08ab6d10a21e1
SHA512881dc95bde0e383acbefa689c61b00797abd428ee8e9592389dc982d53e67dc2bf6f59576a56897ba8862c10e982a8ef4b5e989016e715f4c240a165939087d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
1KB
MD5b299fc01f1c1206e2a8fc38b6be0cdbd
SHA180922e2347442f129231b1f0a3273465bf7001db
SHA256f05f4eb2a340455719caa7c62d0a6394094f28e8378b424f49d1e0eb33842821
SHA5124f8a130e33da704839b19d83f6ce890d802d9305f5add066c15f7b634dc5d762551121c21457dae398993ef190560c4259ab075fd88773ed7e8245a041269024
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
576B
MD5afc33a3715e77756b7818189c034287c
SHA105dae909ea9faf00762688c095b1313b7ca33e30
SHA256db89d5226b2a3235f0bb113c4418f60d89b18990bd414e6b334c35a037ff616d
SHA512ca83ae445a772d3d5252fc90496c36fdd0f2e7b19bb31d9ed6034da70f2aa08a8191b148d1827d9afb5bd32344575f1d78b931e512549d7c772ee545f1dc7d6b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
13KB
MD546c30bb5be80406ba066b73335f10123
SHA1f0ede86f043d0e591a914447fce006c8d5acbf04
SHA2569334516dad1b6d88cf6d34229c5dc35f1524b4a641e39153adcd3a92143db6d3
SHA512efc47fbd4c33d7ec6be0fab6b5a7f8ac9d869a5fdd19246ebd1ad863bd9ef94adf64abb88d5f46402ea5b6cd4493e3c9b688c3c85957a7c9b2ece53159a62fd5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
8KB
MD582cf4b4e1d7a00cbb4c5f2194742a88f
SHA1be7e88762cae977fc770fbd6c41bff1a6b33ddcb
SHA25641e4fd95aeb7df99fb0578471c492e15a07e9fbb8ecd7ce131550148d7c9ee59
SHA51259b0fd23bf82515b597f94eec625532b78040b0633ac6d0074eb1368aa5405cd8175a052804e61de68427c7ef1cd59ad5a4a2e4a5042952f840b2ffc586dedf4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD512014eb14b6e3fc92f2e2f2fe8eb1845
SHA1fa15c246740e91026ad950bc01caba4699525ba0
SHA256b42bfb60b8530bab29e42b318041dbc09761f088743e52a56fbeecdc171ad3cb
SHA512da27dbb3161abde5d5d24c87580571ac98f36b9cf91a7cde630afec5175e8aa3c30f8329b558a017b99915f7d7721aff0213b89357704db1ea358db599a2db26
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD54b6994e94d1f13b7db4c6333d4ca38e9
SHA111fa68f2f49f9faef938a1d8515d16def4d9f457
SHA2562c0834ab4b268cc4b7ab8bee7ae24e3d97392f6e2a4a64fb80ce2de6aabef14d
SHA51230564a4f56aa05b51d68ad33bd6f8a14d85cc9da97f939beb7a02d257b65615779635accb11c69ce74fad3e1642c4d07bfb718939f7f3f654b7e27ac03e90aff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD59cc55eb23c4376e30fe47b8051371467
SHA155b29bc125482345fe474b6d8a981694c782ad13
SHA25637019f139c29749691253ae6582f78e90cd398432c343feedd15d3411c588e34
SHA512aacebffd921aeabe81143e9e3c8510c5104d376827ab21afd2c37632c51a21cca8a3d46748140b8d8a3d2a19e88502e39e26efafbb7b18165297ca739233b36c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
3KB
MD5cbfe3dadeede781c90fd5f797d1cd94d
SHA1ffce7fd088974665f27b0450d6be1c242eab95a3
SHA256dfbd3ab2a6e5c95b637db4c148e5b2e024529a8ce81c7b3843b9ce78db911baa
SHA5127fc04948f8c86086319dc8d57eb0744eba401d24d6d462fcd0047ac11f0467dfb6eac1126203b8606defa8b3af7e6a247526b53cdf612517f515f08a7be5e4e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
5KB
MD58e13c868d422a4ae0d4478b67aeb9f5c
SHA1c8ff9a35ceb7ba4b6b854fef42282e88e50f57d4
SHA25656e2e2d619c215d8eee5b2eba70126a1853f2bedd6e02aca6b22dc3c122fedf0
SHA512583541c5d91dd80ec538910b7a8bb06a697be53173e89fb4d4e3172af96587634789c2cf983995d19227bd819a25b23f235d322165f3a59242eca38c2b24f435
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD58c6ad47c2934435ed5fe507b269b6ccc
SHA18e4544d771c2aa335411b179db8cd4ce926ea13a
SHA25683c9a2394433e64c043caa9ac240b9f58f5d81cf1ad74bc4c14f004578c3af43
SHA5122b72f841c29c6797ac1724eca21545caeea78b412ae19ff02eb29028157bde0c31309d80ec298b16c4054019726aef11178a6be35fd6f8f9cd0f23a6d7adf1fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD54571a85e500a22de95510a376e25153b
SHA10c713c0fb3aa7a47b49115460952cd26b4fb56e1
SHA256166b83791425f77dcfe6a688658a70c23c12718287cd247bd2dfe29cd8789d15
SHA5120395ddbefa5db345c7925be7acffd4ebb47df6472cf071a5bbefb9a01d4ae92eae24a1d1761f45a5bd4d1799fc754d0668d087ffe9f314e9df38c1a913279dfc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5b14a12a015c8f36f5f192c129636136d
SHA12bde3886daed5b6912250ee1c1dcac3de793c43b
SHA256ab7f55a6e55318a3e9dce045a73d51fe67009fbec40396665660c46cba7a49a8
SHA51204af9d59fe4affde5837720eddc56eed8fd70f64c3e148961be9a2f498739f5f256769b6c51e6a8f3761d09411584c5101f14fae05d2015a332e0f7a585bcac4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5c19afeb0f2a8fd7dd926720f698af169
SHA12f5b71132a78e8a665d684d188cf984d53a53d56
SHA2564f52a4db2c97798bf73e58e6d23d17eebd8ea4de581aa3a55e5690f91da167aa
SHA512fe0482029e56fee68adbe93154477b8f615a4662c6656c4ff4b7b558c6194ecafdc90f7a91b4c5b96cf0cc9b3cb0678402c818a4fecc40a7ab35aaee547e5efb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD5ca25e1749effe36e41c051578996a394
SHA153bd954b0b3b24b353fdda9159310ea2c623a39b
SHA256f4983a041231bfd6cbf5aeac3a3c792684c246a355b35e6d5ac40f57cf24b06d
SHA512baaa97c2317312def8c6d85153dcfe44e9d9d33ab5094c018e10595f7665c5e7bb56a132d691710a1edc7bcb469269c00d0e3397f0822eef074ac41785d60426
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
144KB
MD59114bbb47d5d7d45eb9645cf2a4b530a
SHA102382a32665e200fbb49b17e10f8a340581fc55c
SHA2560e7b1df40824c54088c318904ffa4ea96f4dadc28a6c410b16aff13daab55685
SHA5120a29a87ffad8cc2b25b766da4ade842de9b8fea70a6ae88f149922b1b2a6074dd52be043f4e3a6b10577930115383716d31937b6f946d88d6968b136173c1f84
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\Downloads\Entropy.zipFilesize
30.1MB
MD57f51fcdfc10aadf8d8a3153a5e8ad704
SHA1db2c0707840da87ba44917c16c3e09acc000c77d
SHA25612f2e217abd5676ac034ba110f5f03811f9e565f41b40d7b0df2ee3ae3e71e03
SHA51253c6b63c093d7fe56da0fd291abf2f9b16d561661bfb766e3dfe7a879c30a1c0d39f9d0a8b2dd1d99922effff70cf0b969ea10b2b83680e633a448cd1abe4ba7
-
C:\Users\Admin\Downloads\Entropy\Entropy again.rarFilesize
30.1MB
MD5aa3f2c6f0f7e60787e634e32936eacfa
SHA1ef40936c3f976fe6c754ab5f7cb9833ffe3d36d2
SHA256a7527258a4e5c1274208f3da825376d23b148cd729d318c871cc86ad2e464c74
SHA51280330ec86e24baaf78cdd20edc8bb257a08ef60bc5fb840311f68d15ea90ded2e7c13cbd1c2f0b24afddce317561a013f989ac3a54504363e11e009b64b9edec
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a.rarFilesize
30.1MB
MD561e65448800b950ad6227685dc6a3223
SHA16b686a844a48a6d2c0dbc352e27c2c37629e8d7a
SHA256ee16484470f2d15706c327e9c229fb6647851960220505fdfebdd835a77b33af
SHA51236b169af5a26ab5c47f6d804703b2812f5cc91b360d7a1a57314118593b9f155ff5c5d2010623ae328a018e4227bf049fc0d8069fae1c11ff47db2921336974e
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exeFilesize
5.7MB
MD53ede242cabdcb2e4c924cbe57bf0c98b
SHA15020f590ab691d6112fb9b59edeac682e2f8ccc3
SHA256bc59a0885c8bb6c546dc0d24fdb11ed5455fda613211a7eefb78efa4cf7142d0
SHA5120aada6083ebd5c61a7b31016eea34aa6fb22e5e009475e6a816364e0519cb3e0b754d265bb3bd36a81d8ee619a31f4fb9ed3337b915213dadad225abf8da21ae
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exeFilesize
5.7MB
MD53ede242cabdcb2e4c924cbe57bf0c98b
SHA15020f590ab691d6112fb9b59edeac682e2f8ccc3
SHA256bc59a0885c8bb6c546dc0d24fdb11ed5455fda613211a7eefb78efa4cf7142d0
SHA5120aada6083ebd5c61a7b31016eea34aa6fb22e5e009475e6a816364e0519cb3e0b754d265bb3bd36a81d8ee619a31f4fb9ed3337b915213dadad225abf8da21ae
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo Patcher.exeFilesize
5.7MB
MD53ede242cabdcb2e4c924cbe57bf0c98b
SHA15020f590ab691d6112fb9b59edeac682e2f8ccc3
SHA256bc59a0885c8bb6c546dc0d24fdb11ed5455fda613211a7eefb78efa4cf7142d0
SHA5120aada6083ebd5c61a7b31016eea34aa6fb22e5e009475e6a816364e0519cb3e0b754d265bb3bd36a81d8ee619a31f4fb9ed3337b915213dadad225abf8da21ae
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo.dllFilesize
25KB
MD51cade37d0c3b470e45b262b4b6338b9d
SHA13cae3cbdd5553c5ca8155878f1ead847413ea7dc
SHA2562a1b942d5edc00d800b6adf1ec822dc2198096f9b2a274b279eed5d4de1c89ac
SHA512e628d15c1075d163e7994b7607b3477685b0381da67c2fe485fd8212b05e6b2837ba3bab098083082f01209daa864501df00e30067062886a5a416bce8941def
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\Kangaroo.dllFilesize
25KB
MD51cade37d0c3b470e45b262b4b6338b9d
SHA13cae3cbdd5553c5ca8155878f1ead847413ea7dc
SHA2562a1b942d5edc00d800b6adf1ec822dc2198096f9b2a274b279eed5d4de1c89ac
SHA512e628d15c1075d163e7994b7607b3477685b0381da67c2fe485fd8212b05e6b2837ba3bab098083082f01209daa864501df00e30067062886a5a416bce8941def
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exeFilesize
8.2MB
MD5524f67ffd889c34fa7e16482f8a05ccb
SHA10c76c178940c9444e83e774974d24f24119d0258
SHA256ab33e56d4b89961a4b6907f2502c6348d8113a33acce6fb0dc3ccb8f06331a09
SHA5129fd437b6d0ac837e84e5b61b3b169e050608b6f9b87df1e71cbee7ef900b6b2a50d9855c46eaf56bfd61201ba1cbdbc75b1dc4b80c138e166accdd556de23573
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy (old)\entropy.exeFilesize
8.2MB
MD5524f67ffd889c34fa7e16482f8a05ccb
SHA10c76c178940c9444e83e774974d24f24119d0258
SHA256ab33e56d4b89961a4b6907f2502c6348d8113a33acce6fb0dc3ccb8f06331a09
SHA5129fd437b6d0ac837e84e5b61b3b169e050608b6f9b87df1e71cbee7ef900b6b2a50d9855c46eaf56bfd61201ba1cbdbc75b1dc4b80c138e166accdd556de23573
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exeFilesize
11.5MB
MD5b0dc9a1cefbc083bac5a54a02429692d
SHA133dc91058557075ef6dc5248b0e88d37f14c0cb5
SHA256b76402869c68a900178d62543b2f0451ff5f3106ca8df4512d9db27105dbad1d
SHA5121d479199ba1265fe88fc20073b566879fbaf929580ed6b39c408267b210097b78a6d16c384238b14ed3337a4bfd9b1ca24cc3f795e1ddabe89f947b7a09d205a
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exeFilesize
11.5MB
MD5b0dc9a1cefbc083bac5a54a02429692d
SHA133dc91058557075ef6dc5248b0e88d37f14c0cb5
SHA256b76402869c68a900178d62543b2f0451ff5f3106ca8df4512d9db27105dbad1d
SHA5121d479199ba1265fe88fc20073b566879fbaf929580ed6b39c408267b210097b78a6d16c384238b14ed3337a4bfd9b1ca24cc3f795e1ddabe89f947b7a09d205a
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\EntropyV3.exeFilesize
11.5MB
MD5b0dc9a1cefbc083bac5a54a02429692d
SHA133dc91058557075ef6dc5248b0e88d37f14c0cb5
SHA256b76402869c68a900178d62543b2f0451ff5f3106ca8df4512d9db27105dbad1d
SHA5121d479199ba1265fe88fc20073b566879fbaf929580ed6b39c408267b210097b78a6d16c384238b14ed3337a4bfd9b1ca24cc3f795e1ddabe89f947b7a09d205a
-
C:\Users\Admin\Downloads\Entropy\Entropy again\Entropy a\entropy\READ ME.txtFilesize
533B
MD5babdd2019b474c09bb74e08a45be1007
SHA1b36773263dd498d36090d75ed92a79ed74452b10
SHA256d029342db9a0d5078fad181b0df85bb44225325959ed87ad7aff0b17027fd9a6
SHA512bf1517c0c0dce6749f52621358445cf39b2315c931a7551ec781ed02db552ba6dc5d05c0c69abdff4c834294150f83d82b9984ac69938fc1e744a2df20672616
-
C:\Users\Admin\Downloads\Unconfirmed 836096.crdownloadFilesize
992KB
MD564f738db06991cfc73b5fb1205a1d629
SHA1bae106418be1c07577154842dbc3c1c7617951e0
SHA2565d98c10076f142ff9c9a6b0145c28deb4f2b7a7f51cb199f25f966f9371e69b6
SHA5129cc64781d1e20347e64610613aa73287f0ea33919f9c87e04512b24f215c531cd466866be6deb0ed859daa902d82d0334a75db781eafe9378adb2c86b797c521
-
\??\pipe\crashpad_2164_EEVVYCXYMLCZSTUIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2456-586-0x0000000140000000-0x0000000141003000-memory.dmpFilesize
16.0MB
-
memory/3248-613-0x00007FFC8EA30000-0x00007FFC8EA32000-memory.dmpFilesize
8KB
-
memory/3248-615-0x00007FF7F1540000-0x00007FF7F24C3000-memory.dmpFilesize
15.5MB
-
memory/3248-614-0x00007FFC8EA40000-0x00007FFC8EA42000-memory.dmpFilesize
8KB
-
memory/4180-602-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmpFilesize
15.0MB
-
memory/4180-603-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmpFilesize
15.0MB
-
memory/4576-605-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmpFilesize
15.0MB
-
memory/4576-611-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmpFilesize
15.0MB
-
memory/4576-612-0x00007FF66DC50000-0x00007FF66EB46000-memory.dmpFilesize
15.0MB
-
memory/5280-619-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-621-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-620-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-625-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-626-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-627-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-628-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-629-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-630-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5280-631-0x00000218C5F40000-0x00000218C5F41000-memory.dmpFilesize
4KB
-
memory/5480-426-0x00007FFC8EA30000-0x00007FFC8EA32000-memory.dmpFilesize
8KB
-
memory/5480-427-0x00007FFC8EA40000-0x00007FFC8EA42000-memory.dmpFilesize
8KB
-
memory/5480-428-0x0000000140000000-0x0000000141003000-memory.dmpFilesize
16.0MB