Overview
overview
10Static
static
10f3beb34cc0...f7.exe
windows7-x64
4f3beb34cc0...f7.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3Bearly.exe
windows7-x64
1Bearly.exe
windows10-2004-x64
5LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/...d.html
windows7-x64
1resources/...d.html
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 00:06
Behavioral task
behavioral1
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Bearly.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Bearly.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240508-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240215-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
locales/af.ps1
Resource
win7-20240215-en
Behavioral task
behavioral23
Sample
locales/af.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
locales/uk.ps1
Resource
win7-20240419-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
resources/dist/pages/cantLoad.html
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
resources/dist/pages/cantLoad.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
vk_swiftshader.dll
Resource
win7-20231129-en
Behavioral task
behavioral31
Sample
vk_swiftshader.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
vulkan-1.dll
Resource
win7-20240221-en
General
-
Target
Bearly.exe
-
Size
154.7MB
-
MD5
88b6fcc98fa8fc9cc8f1a6feae35b6df
-
SHA1
3ad34fe3567d7fd7518fef99c0bb112c3c50464b
-
SHA256
a87607b53250badcf6829e42e0d5f84b1d47f1861b49de23135e44978b8d0f07
-
SHA512
c1a2b5cd7bd77faad31861305f0562e2a0c3f15ecc4bbcb1931d3064ed9ef6c8fd85f7fa0d7e723059153fa8ef5d598907e98dcf4f1c6e3a0e68c55fcef5a847
-
SSDEEP
1572864:4BtbwS6fGMIgBx5GZ7W1S9/kYGaWCLmXLnT2RGIfdZSHV0omQTk+R7BULUGSh6Tr:un9LLmXdd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation Bearly.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz Bearly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Bearly.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Bearly.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly\shell Bearly.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly\shell\open Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Bearly.exe\" \"%1\"" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly\URL Protocol Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly\ = "URL:bearly" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\bearly\shell\open\command Bearly.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4420 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3152 Bearly.exe 3152 Bearly.exe 2212 Bearly.exe 2212 Bearly.exe 5276 Bearly.exe 5276 Bearly.exe 5276 Bearly.exe 5276 Bearly.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe Token: SeShutdownPrivilege 2008 Bearly.exe Token: SeCreatePagefilePrivilege 2008 Bearly.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2008 Bearly.exe 2008 Bearly.exe 2008 Bearly.exe 2008 Bearly.exe 2008 Bearly.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2008 Bearly.exe 2008 Bearly.exe 2008 Bearly.exe 2008 Bearly.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 3952 2008 Bearly.exe 83 PID 2008 wrote to memory of 3952 2008 Bearly.exe 83 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 468 2008 Bearly.exe 84 PID 2008 wrote to memory of 3152 2008 Bearly.exe 85 PID 2008 wrote to memory of 3152 2008 Bearly.exe 85 PID 2008 wrote to memory of 2212 2008 Bearly.exe 86 PID 2008 wrote to memory of 2212 2008 Bearly.exe 86 PID 2008 wrote to memory of 4420 2008 Bearly.exe 87 PID 2008 wrote to memory of 4420 2008 Bearly.exe 87 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89 PID 2008 wrote to memory of 7988 2008 Bearly.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Bearly.exeC:\Users\Admin\AppData\Local\Temp\Bearly.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Bearly /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Bearly\Crashpad --url=https://f.a.k/e --annotation=_productName=Bearly --annotation=_version=3.0.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=24.4.0 --initial-client-data=0x464,0x468,0x46c,0x45c,0x470,0x7ff68cfedc70,0x7ff68cfedc80,0x7ff68cfedc902⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1780,i,4544674905522041017,11107391944732841477,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1828 --field-trial-handle=1780,i,4544674905522041017,11107391944732841477,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2356 --field-trial-handle=1780,i,4544674905522041017,11107391944732841477,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bearly2⤵
- Modifies registry key
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3592 --field-trial-handle=1780,i,4544674905522041017,11107391944732841477,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:7988
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3760 --field-trial-handle=1780,i,4544674905522041017,11107391944732841477,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:8128
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1780,i,4544674905522041017,11107391944732841477,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
48B
MD55a664680d2435811d7478e7dc16f75d7
SHA1c75f1b4efbb1cf4ff89c0fec2a66ccb97c09ea78
SHA25602cd8f7fc63f3b650e0d0e87b51aed12afff4e30e07f11aecc72907707876f4e
SHA512c75ab693b6cbdbee91df492438fbc6feb480d1d1e6db15926a8c572878002bfcd647e53bb6fe96eb5fd103d8ffeca9db6e45a23fc7a59faa8fde00a4ddac10d0
-
Filesize
192B
MD5e9225a63c66a8415a9f535feb6b1b4cf
SHA11c746a9af021f80d990168faa61364c71ea89e75
SHA2562c25824f09c0d4af6f4b69efd84408ca4741ec390db6c68abbbb3c298d81b316
SHA5124c886183ffdc08d62821b09bbe4348e233bfd7138d4ad3c74f0f5de968b4d565d6dd5f79638772b7483f3917d4b79e249c7c8176cd5182b52b67115bfc610038
-
Filesize
1KB
MD58dddcf569f0ac0f248ab5c15341ba6a4
SHA1f4c3813d96db2c6ba7b0e601441943bdc7baa3ea
SHA25637f6890afefb23398e0e084f92c82f7c3ce1f9c3d8a8b7476d29b8596ab3d46a
SHA512dc0e5001fa31e834467ae73c5c876210e0e834de5090a6905413284787ad732d0d52c67e1bdcdcb8f08e326b8e30970d77a735575e3452db62930173ff2800a8
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
72B
MD55fad53c735781b4cf43fb30ae19fa90a
SHA1e350b02cce5c7d61e5c5c23fe3f94a67a6f22ada
SHA25674464b80522e84a72491b78e03dff02514b2812b4d0b26858b476a2e9cef370d
SHA5128c2af4d8fb9418454fdd236ecc8ced7f106db86c26b438ea16694166f38c77d33ba7bd957667fa0deff9fd883a0b2edac3fb7f2e4fad2864eb79907024eb7c33
-
C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\ScriptCache\index-dir\the-real-index~RFe57bd45.TMP
Filesize48B
MD5c0e58828d0c87d9a0f381134afeb4392
SHA17e4f9255d08dbffad276f4e229a5c4191eb5d817
SHA2569b810cbaf2450fe7254d28c954c6374a9f686963565ecce8b7b945576baff526
SHA512762f8976a085890df241737a02733e38abb3823bf898cca5f0c97d83614016ee3566bb8e879f6d22f9ae6f2458e32646af90f270f2caea488435f3d9f5ab6294
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
34B
MD51ffb53e0bcfa1dfde7672728e3114815
SHA1ec46721ab0c27d9e707f63c2ee748c954d775de2
SHA2568e3ed5120a02820b427cb66f4f10c93aa4ca6415f332686b39174a6e04a70c76
SHA5125aaabd51ac0b126c05d881e07fdaf1d82e86f5c6b5aea347ea53ea507fad953409e213ca0ae05bbf0921b478b595fbdbfada1eafd5ec39fbb9454434f0f5d424
-
Filesize
64B
MD5b571feedd7a6cfefa26b73514d57a7c7
SHA133d4945a08a2040a4707b44d21483cd00858cb7d
SHA256bf7d1e5bafc682ba7bf07389750e4165fa3076e69625630998b4a528f5e6d635
SHA5128d2f594f4f568005005f2ba23bdd67ccdfd4bf56ada577993aaed596c839263f223dc2180897b906d8a8e94fd060eccda97a6cc2f464bd507182db45f4a017c7
-
Filesize
113B
MD50c2bb92bc63d59da117b6542b8ca9edb
SHA11841f159e4e2074fd921877937016a21ff4f0f90
SHA256dc011a83b38ed30c2eb64000cd76d92dd2fa807170fbe2dbab77bc5221471ab3
SHA5128b4f251a74afe73a4c8fa003b5e0d65b33ac642567c73500783f1339e892fe76f3e524d5b56faf0bdff6a799c9581136fe33ac6fc1f135400440ce05abd57e9f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84