Overview
overview
10Static
static
10f3beb34cc0...f7.exe
windows7-x64
4f3beb34cc0...f7.exe
windows10-2004-x64
5$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3Bearly.exe
windows7-x64
1Bearly.exe
windows10-2004-x64
5LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources/...d.html
windows7-x64
1resources/...d.html
windows10-2004-x64
1resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 00:22
Behavioral task
behavioral1
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3beb34cc046e27623b8ed753d3fc50584aaf6f388aa6bb75780d1043326e4f7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Bearly.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Bearly.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240508-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240508-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
locales/af.ps1
Resource
win7-20240508-en
Behavioral task
behavioral23
Sample
locales/af.ps1
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
locales/uk.ps1
Resource
win7-20240508-en
Behavioral task
behavioral25
Sample
locales/uk.ps1
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
resources/dist/pages/cantLoad.html
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
resources/dist/pages/cantLoad.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
resources/elevate.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral30
Sample
vk_swiftshader.dll
Resource
win7-20240215-en
Behavioral task
behavioral31
Sample
vk_swiftshader.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral32
Sample
vulkan-1.dll
Resource
win7-20240508-en
General
-
Target
Bearly.exe
-
Size
154.7MB
-
MD5
88b6fcc98fa8fc9cc8f1a6feae35b6df
-
SHA1
3ad34fe3567d7fd7518fef99c0bb112c3c50464b
-
SHA256
a87607b53250badcf6829e42e0d5f84b1d47f1861b49de23135e44978b8d0f07
-
SHA512
c1a2b5cd7bd77faad31861305f0562e2a0c3f15ecc4bbcb1931d3064ed9ef6c8fd85f7fa0d7e723059153fa8ef5d598907e98dcf4f1c6e3a0e68c55fcef5a847
-
SSDEEP
1572864:4BtbwS6fGMIgBx5GZ7W1S9/kYGaWCLmXLnT2RGIfdZSHV0omQTk+R7BULUGSh6Tr:un9LLmXdd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Bearly.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation Bearly.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Bearly.exe\" \"%1\"" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly\URL Protocol Bearly.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly\ = "URL:bearly" Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly\shell\open\command Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly\shell Bearly.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000_Classes\bearly\shell\open Bearly.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4816 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 956 Bearly.exe 956 Bearly.exe 1096 Bearly.exe 1096 Bearly.exe 1320 Bearly.exe 1320 Bearly.exe 1320 Bearly.exe 1320 Bearly.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe Token: SeShutdownPrivilege 2044 Bearly.exe Token: SeCreatePagefilePrivilege 2044 Bearly.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2044 Bearly.exe 2044 Bearly.exe 2044 Bearly.exe 2044 Bearly.exe 2044 Bearly.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2044 Bearly.exe 2044 Bearly.exe 2044 Bearly.exe 2044 Bearly.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1364 2044 Bearly.exe 85 PID 2044 wrote to memory of 1364 2044 Bearly.exe 85 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 3492 2044 Bearly.exe 86 PID 2044 wrote to memory of 956 2044 Bearly.exe 87 PID 2044 wrote to memory of 956 2044 Bearly.exe 87 PID 2044 wrote to memory of 1096 2044 Bearly.exe 88 PID 2044 wrote to memory of 1096 2044 Bearly.exe 88 PID 2044 wrote to memory of 4816 2044 Bearly.exe 89 PID 2044 wrote to memory of 4816 2044 Bearly.exe 89 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95 PID 2044 wrote to memory of 5296 2044 Bearly.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Bearly.exeC:\Users\Admin\AppData\Local\Temp\Bearly.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\Bearly /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\Bearly\Crashpad --url=https://f.a.k/e --annotation=_productName=Bearly --annotation=_version=3.0.0 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=24.4.0 --initial-client-data=0x45c,0x464,0x468,0x438,0x46c,0x7ff7941adc70,0x7ff7941adc80,0x7ff7941adc902⤵PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1756,i,7172732453133590654,4359888689152272012,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=1740 --field-trial-handle=1756,i,7172732453133590654,4359888689152272012,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2352 --field-trial-handle=1756,i,7172732453133590654,4359888689152272012,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Bearly2⤵
- Modifies registry key
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3512 --field-trial-handle=1756,i,7172732453133590654,4359888689152272012,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:5296
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --standard-schemes --secure-schemes --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --service-worker-schemes --streaming-schemes --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3660 --field-trial-handle=1756,i,7172732453133590654,4359888689152272012,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Checks computer location settings
PID:5444
-
-
C:\Users\Admin\AppData\Local\Temp\Bearly.exe"C:\Users\Admin\AppData\Local\Temp\Bearly.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Bearly" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 --field-trial-handle=1756,i,7172732453133590654,4359888689152272012,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD52a7fcfcfbb183f41ee421de991fb9a29
SHA1eb6e887b65ae8df89580b0ebffec16a41d2b4c71
SHA2569eb8825e477ad59e7ba3a7af1d7109d2972c49c3db7406d1933bc3bc2dff8907
SHA5125c34bfeb91ddef88b6cee3c1217f0e8ea7836efda6cd588c8b4c363d2225163d78e1060ca8625b9a375019957691a5caa2f2c9cf24cf1ffed51a7982e3ed7f39
-
Filesize
192B
MD5a6a7024436817b36b352d53f59494be9
SHA1cc82ccfb48b68eed1e023b7ed425f30c1595d1a7
SHA256c3c2c11ded57fc80702e308b4192a05cf4887894638424577c025ea572b9b65d
SHA5127f3dc19e1bd3dd15138d7af447cdacb354176834d1d829206a014a5b4ed83ddb07d02912e738270154a6736c53b7a6368acabd7bcbb8f925665629508fd4b8cf
-
Filesize
1KB
MD5f3c962c01d954ba882cd86a98026176e
SHA1ea8e649b6af80a61a7eba022e67205af8f77f8a6
SHA25635888b17b49877a08b72b24ab71c6bfb1dc64785f460635f48dbc8ca928e6210
SHA5120734ff0ce642af0edba9c30602951b5e11b2e42b8eb98e9056e1a3227dd1abcfd07b6eee0ee6760f9d02357af3c85a58e1f7d792c7945e34989a30a51ddd619e
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
72B
MD59087061900b591d81bb4f5c26c61c08f
SHA1851b88417c9f328529927aa38380fdbd1b0a75d4
SHA2565879c76d658800c94a71cd0cdf14a81a924e31c9da5d5bdb9ec83704f43ddffe
SHA5126079a9c1dc6447c1ca1be3ad3e5eab68191d49f5ca057b8191c45e49bccc01ad81f286be0aa2fc47223e13e7587e7c7fe7d3dcdc19261902f2632d1911ada8c1
-
C:\Users\Admin\AppData\Roaming\Bearly\Service Worker\ScriptCache\index-dir\the-real-index~RFe579d0b.TMP
Filesize48B
MD56d3e378747724b99bbc4c6a53d5132a3
SHA14622ded4ab6b5f5857eed411d8f6352d2dbdef77
SHA2566463a9b5dc3a9a26650d2286c5e0f54247b6b18073de68674e00f5483b8b680f
SHA512b0efc923db7cbe9c50ba19eb31d5b0cb70704731d873d6e0494f323e25b575b436b70eb7b3ebf459c651f4a5f3fd0acb91b37307395e45340d768e6768281b00
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
34B
MD51ffb53e0bcfa1dfde7672728e3114815
SHA1ec46721ab0c27d9e707f63c2ee748c954d775de2
SHA2568e3ed5120a02820b427cb66f4f10c93aa4ca6415f332686b39174a6e04a70c76
SHA5125aaabd51ac0b126c05d881e07fdaf1d82e86f5c6b5aea347ea53ea507fad953409e213ca0ae05bbf0921b478b595fbdbfada1eafd5ec39fbb9454434f0f5d424
-
Filesize
64B
MD5b571feedd7a6cfefa26b73514d57a7c7
SHA133d4945a08a2040a4707b44d21483cd00858cb7d
SHA256bf7d1e5bafc682ba7bf07389750e4165fa3076e69625630998b4a528f5e6d635
SHA5128d2f594f4f568005005f2ba23bdd67ccdfd4bf56ada577993aaed596c839263f223dc2180897b906d8a8e94fd060eccda97a6cc2f464bd507182db45f4a017c7
-
Filesize
143B
MD5b3ed4e099f2fc7da4f4d8d42fb894e80
SHA1f9969d8fbef1946bf6f57d6b7af06981b75d7ab9
SHA2566b2c996a1bac93c2b2549db2cd81d888453ca9d088d3453b17657597d8bff56d
SHA512b9d20078a583877fa58a9b4a50f63cf131a0a06eefa2da57d8c1f3160ad724e0f470cfd7e94f94b1b5c3c4ae750515e5953cc2b66d2adbb96bc78f1cfc1061eb
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84