Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3b9c3eb4289...13.exe
windows7-x64
7b9c3eb4289...13.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3Babalar.exe
windows7-x64
1Babalar.exe
windows10-2004-x64
7LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/uk.ps1
windows7-x64
1locales/uk.ps1
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
b9c3eb4289b11084b9d203ee1ac1af13.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9c3eb4289b11084b9d203ee1ac1af13.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Babalar.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Babalar.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240220-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240220-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
locales/uk.ps1
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
locales/uk.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
resources/elevate.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
vk_swiftshader.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
vulkan-1.dll
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
vulkan-1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240220-en
General
-
Target
Babalar.exe
-
Size
154.5MB
-
MD5
0fc5102a2cbcf6b049fa89171a56a102
-
SHA1
8515d0e6bc5fc93f1bc03737c380c8d7437ca456
-
SHA256
330b558cfa340ee080c93becbc09e639215ba63232a1a48f2759b2eaf6297147
-
SHA512
9ee79b08ccdbbe5322fab2c4fdafe8bccab4f194e14084395c1f633e7b324b00793332d9eb65278f960fac697c40aea9d9405afe9fbe1a0cbcf59a89d0a5d92b
-
SSDEEP
1572864:cCquurbtqKajQe7vqrTU4PrCsdCXrBngPE1cG7VOWe2IkBmUgq3Fd6iU3x6VCdbm:2DAgZi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Babalar.exe -
Loads dropped DLL 1 IoCs
pid Process 60 Babalar.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org -
An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
pid Process 4180 cmd.exe 1888 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1748 tasklist.exe 1824 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2764 powershell.exe 2764 powershell.exe 2764 powershell.exe 4276 powershell.exe 4276 powershell.exe 2360 Babalar.exe 2360 Babalar.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1748 tasklist.exe Token: SeDebugPrivilege 1824 tasklist.exe Token: SeDebugPrivilege 2764 powershell.exe Token: SeDebugPrivilege 4276 powershell.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe Token: SeShutdownPrivilege 60 Babalar.exe Token: SeCreatePagefilePrivilege 60 Babalar.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 60 wrote to memory of 2708 60 Babalar.exe 88 PID 60 wrote to memory of 2708 60 Babalar.exe 88 PID 2708 wrote to memory of 1748 2708 cmd.exe 90 PID 2708 wrote to memory of 1748 2708 cmd.exe 90 PID 60 wrote to memory of 1324 60 Babalar.exe 94 PID 60 wrote to memory of 1324 60 Babalar.exe 94 PID 60 wrote to memory of 4180 60 Babalar.exe 96 PID 60 wrote to memory of 4180 60 Babalar.exe 96 PID 1324 wrote to memory of 1824 1324 cmd.exe 98 PID 1324 wrote to memory of 1824 1324 cmd.exe 98 PID 4180 wrote to memory of 2764 4180 cmd.exe 99 PID 4180 wrote to memory of 2764 4180 cmd.exe 99 PID 60 wrote to memory of 1888 60 Babalar.exe 100 PID 60 wrote to memory of 1888 60 Babalar.exe 100 PID 1888 wrote to memory of 4276 1888 cmd.exe 102 PID 1888 wrote to memory of 4276 1888 cmd.exe 102 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 3428 60 Babalar.exe 103 PID 60 wrote to memory of 4852 60 Babalar.exe 104 PID 60 wrote to memory of 4852 60 Babalar.exe 104 PID 60 wrote to memory of 2360 60 Babalar.exe 120 PID 60 wrote to memory of 2360 60 Babalar.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\Babalar.exe"C:\Users\Admin\AppData\Local\Temp\Babalar.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,43,198,53,56,60,158,173,64,46,88,150,22,150,74,187,10,162,35,140,44,194,181,226,8,96,53,28,241,227,95,72,133,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,102,101,34,50,234,149,184,54,179,243,5,180,220,157,236,48,3,140,208,250,50,130,86,214,249,202,131,208,174,19,48,179,48,0,0,0,101,181,136,200,32,24,200,118,33,230,159,117,175,31,130,153,187,35,81,54,254,162,142,197,9,70,200,154,182,118,147,21,86,47,155,233,186,26,170,45,229,96,41,41,233,239,151,110,64,0,0,0,44,142,18,253,21,65,67,0,192,174,58,149,232,66,42,90,118,74,43,1,229,78,42,231,161,75,234,179,143,155,184,141,46,195,24,219,63,97,49,7,90,101,67,17,152,32,183,104,236,22,2,146,68,74,127,88,178,142,78,131,25,63,114,148), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,43,198,53,56,60,158,173,64,46,88,150,22,150,74,187,10,162,35,140,44,194,181,226,8,96,53,28,241,227,95,72,133,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,102,101,34,50,234,149,184,54,179,243,5,180,220,157,236,48,3,140,208,250,50,130,86,214,249,202,131,208,174,19,48,179,48,0,0,0,101,181,136,200,32,24,200,118,33,230,159,117,175,31,130,153,187,35,81,54,254,162,142,197,9,70,200,154,182,118,147,21,86,47,155,233,186,26,170,45,229,96,41,41,233,239,151,110,64,0,0,0,44,142,18,253,21,65,67,0,192,174,58,149,232,66,42,90,118,74,43,1,229,78,42,231,161,75,234,179,143,155,184,141,46,195,24,219,63,97,49,7,90,101,67,17,152,32,183,104,236,22,2,146,68,74,127,88,178,142,78,131,25,63,114,148), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,201,230,97,125,240,15,113,26,243,39,203,109,36,159,227,153,24,176,220,244,135,232,118,95,13,22,189,3,220,32,148,128,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,227,14,209,42,3,149,123,15,186,217,226,89,144,161,234,86,128,81,66,158,124,161,224,147,94,247,210,71,122,229,64,50,48,0,0,0,87,26,76,98,25,166,137,35,42,36,178,81,91,209,188,75,165,169,34,40,51,94,90,219,183,188,10,128,116,142,31,226,61,123,161,5,9,192,40,151,152,169,184,87,118,178,175,147,64,0,0,0,86,197,110,156,197,95,221,79,211,15,146,26,140,170,247,130,90,255,169,126,20,43,4,78,172,249,146,43,123,49,193,191,2,25,241,225,11,103,214,38,72,37,132,171,97,107,38,187,12,240,239,239,139,86,241,90,119,246,172,254,232,37,229,58), $null, 'CurrentUser')"2⤵
- An obfuscated cmd.exe command-line is typically used to evade detection.
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,192,218,118,111,122,74,164,64,163,38,154,151,69,200,225,129,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,201,230,97,125,240,15,113,26,243,39,203,109,36,159,227,153,24,176,220,244,135,232,118,95,13,22,189,3,220,32,148,128,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,227,14,209,42,3,149,123,15,186,217,226,89,144,161,234,86,128,81,66,158,124,161,224,147,94,247,210,71,122,229,64,50,48,0,0,0,87,26,76,98,25,166,137,35,42,36,178,81,91,209,188,75,165,169,34,40,51,94,90,219,183,188,10,128,116,142,31,226,61,123,161,5,9,192,40,151,152,169,184,87,118,178,175,147,64,0,0,0,86,197,110,156,197,95,221,79,211,15,146,26,140,170,247,130,90,255,169,126,20,43,4,78,172,249,146,43,123,49,193,191,2,25,241,225,11,103,214,38,72,37,132,171,97,107,38,187,12,240,239,239,139,86,241,90,119,246,172,254,232,37,229,58), $null, 'CurrentUser')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Babalar.exe"C:\Users\Admin\AppData\Local\Temp\Babalar.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Babalar" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1880,i,6234342849899864782,14053026923868221289,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Babalar.exe"C:\Users\Admin\AppData\Local\Temp\Babalar.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Babalar" --mojo-platform-channel-handle=2164 --field-trial-handle=1880,i,6234342849899864782,14053026923868221289,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\Babalar.exe"C:\Users\Admin\AppData\Local\Temp\Babalar.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Babalar" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1880,i,6234342849899864782,14053026923868221289,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f48896adf9a23882050cdff97f610a7f
SHA14c5a610df62834d43f470cae7e851946530e3086
SHA2563ae35c2828715a2f9a5531d334a0cfffc81396c2dc058ca42a9943f3cdc22e78
SHA51216644246f2a35a186fcb5c2b6456ed6a16e8db65ad1383109e06547f9b1f9358f071c30cca541ca4cf7bae66cb534535e88f75f6296a4bfc6c7b22b0684a6ba9
-
Filesize
1KB
MD5edde8f0d1c2b354e54dfe40cc569eab0
SHA1527e75e7d1bcbd62eddb32544e5f8e0a5a09296a
SHA2560f34a5a9c6db0916597e6f822b6619350204fe2f1ff21a4e10c87098f33e5d41
SHA512039f8707b428dee74545279c435975a07a2b4743819f67270188beb12cc9bce9233b0b3e81c4219ea31a530952f297a7bf63b9c61ba0950acbccab753db182fd
-
Filesize
1.8MB
MD53072b68e3c226aff39e6782d025f25a8
SHA1cf559196d74fa490ac8ce192db222c9f5c5a006a
SHA2567fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01
SHA51261ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82