Analysis Overview
Threat Level: Known bad
The file https://solutionhub.cc/download/ZharkBOT.exe was found to be: Known bad.
Malicious Activity Summary
AsyncRat
Downloads MZ/PE file
Executes dropped EXE
Checks computer location settings
Adds Run key to start application
Suspicious use of SetThreadContext
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Enumerates system info in registry
Modifies data under HKEY_USERS
NTFS ADS
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of WriteProcessMemory
Modifies registry class
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-07-01 23:16
Signatures
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-01 23:16
Reported
2024-07-01 23:24
Platform
win11-20240611-en
Max time kernel
441s
Max time network
440s
Command Line
Signatures
AsyncRat
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Downloads\ZharkBOT.exe | N/A |
| N/A | N/A | C:\ProgramData\34vgn892c.exe | N/A |
| N/A | N/A | C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\ZharkBOT.exe | N/A |
| N/A | N/A | C:\ProgramData\34vgn892c.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000\Software\Microsoft\Windows\CurrentVersion\Run\3v82v2vcc2 = "C:\\ProgramData\\34vgn892c.exe" | C:\ProgramData\34vgn892c.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uqwgg = "C:\\Users\\Admin\\AppData\\Local\\Uqwgg.exe" | C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000\Software\Microsoft\Windows\CurrentVersion\Run\3v82v2vcc2 = "C:\\ProgramData\\34vgn892c.exe" | C:\ProgramData\34vgn892c.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 768 set thread context of 1224 | N/A | C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe |
Enumerates physical storage devices
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643494072418072" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell\open | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell\open\command | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell\open\command\ | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell\open\command | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-2394516847-3409208829-2230326962-1000_Classes\ms-settings\shell\open | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
NTFS ADS
| Description | Indicator | Process | Target |
| File created | C:\ProgramData\34vgn892c.exe\:Zone.Identifier:$DATA | C:\Users\Admin\Downloads\ZharkBOT.exe | N/A |
| File opened for modification | C:\Users\Admin\Downloads\ZharkBOT.exe:Zone.Identifier | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://solutionhub.cc/download/ZharkBOT.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffff154ab58,0x7ffff154ab68,0x7ffff154ab78
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2060 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2980 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3800 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4772 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4784 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2972 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4796 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3428 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:8
C:\Users\Admin\Downloads\ZharkBOT.exe
"C:\Users\Admin\Downloads\ZharkBOT.exe"
C:\ProgramData\34vgn892c.exe
"C:\ProgramData\34vgn892c.exe"
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
"C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1716 --field-trial-handle=1780,i,13125388264315982989,17915629702150275319,131072 /prefetch:1
C:\Users\Admin\Downloads\ZharkBOT.exe
"C:\Users\Admin\Downloads\ZharkBOT.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
C:\ProgramData\34vgn892c.exe
"C:\ProgramData\34vgn892c.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | solutionhub.cc | udp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | 10.200.250.142.in-addr.arpa | udp |
| US | 35.190.80.1:443 | a.nel.cloudflare.com | tcp |
| US | 35.190.80.1:443 | a.nel.cloudflare.com | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 104.21.2.10:443 | solutionhub.cc | udp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| GB | 172.217.169.67:80 | c.pki.goog | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | 67.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.mediafire.com | udp |
| US | 104.16.113.74:443 | www.mediafire.com | tcp |
| US | 199.91.155.70:443 | download2329.mediafire.com | tcp |
| US | 20.163.171.63:8880 | tcp | |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:80 | solutionhub.cc | tcp |
Files
\??\pipe\crashpad_248_JZVIHGAPFAPTKNPA
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\5e42b0e4-4d90-4668-9fe0-6c3406f313b1.tmp
| MD5 | aff1d93b671e2802ac05758f76e4739b |
| SHA1 | 761bdada8e9293064302b2091abc83880b367cfc |
| SHA256 | cc5867437749e85c32b5550970374b3bd13a30e63c0b43ba2ab0f4ba8b01b4f6 |
| SHA512 | 5c73a4569fa17f3e10ef9adef434d1c9a577224f9cf1e8dbbfc21e93378c5ebdd86682775acc422760282a490be9c1ef5be7571755a2fcf8e96490b2c9377a07 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 21bde9ba043659ca5fa65a4a71425663 |
| SHA1 | 77b69f269b8e4bc2f31549ec62db0b3c32481fa5 |
| SHA256 | 01c8516205bb2f3f42c1f18329e1944cbd614ca0ba1d5b3e925af1a718677303 |
| SHA512 | 15fb2cb208345b47a4f9427c260ea1cdec90e3b593c4be85baf38f430c7c0512bcb1c187bd530c63ee8d6e28098ddf32984784d795d6c19ecf5ea548801560ac |
C:\Users\Admin\Downloads\Unconfirmed 158545.crdownload
| MD5 | 339271af2bbdad0395a479c3ef2a714a |
| SHA1 | 4f38b94fdb7f3cc4cf9f79bbb4d4311b85f0e14b |
| SHA256 | 71769ebf723749783f5e79f7b8a43d6ef03582fca2d1d26cad69157b73004f2b |
| SHA512 | b93d038fd8159cf46f9568f60a22080b0a6e7b383028b47983465dd0c5fe1611a0e0eb99e141c2ee1604b29df6530605f489e05389904eff51048bd9d2e4eb0e |
C:\Users\Admin\Downloads\ZharkBOT.exe:Zone.Identifier
| MD5 | fbccf14d504b7b2dbcb5a5bda75bd93b |
| SHA1 | d59fc84cdd5217c6cf74785703655f78da6b582b |
| SHA256 | eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913 |
| SHA512 | aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 1b8813d6a3b54cdc53057413b4553e51 |
| SHA1 | af73280cc48f4db74d090fd4a1c22f067b2b9cff |
| SHA256 | 499bae0579deda1af2032b833408e73a0832fb2a5028e16d8df72045ce1e27e0 |
| SHA512 | e5928ab279049ece1a3d4470190c3e63d2c4c8bb169b3dcbfce53ade7ca3d1e49a4f4a23b66b0b78054f7ba8c2523e4506535dec540ae607cae958ea9f612b7a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57d467.TMP
| MD5 | 4a9949410fd85e1c9570b678f44ec2cf |
| SHA1 | 8613757ab6bdaa1fa256425f0b3d7833c8c35292 |
| SHA256 | 3dcd9a5a366c4652d66071a73ec861f7a5f87f99bac906cccb48d9dcc9422e92 |
| SHA512 | b1bd84412e69ca379377666942a03dcce51328f8bb0065134e0b2394f51d506176ba4b3fca1b9029bb778cd6b5a5fb08a478582202112a073183a1d042381566 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache
| MD5 | a4c93c59adcb41a17ff924e397cf3854 |
| SHA1 | 620d2c256b3eea722c91a944a1117940de609ed7 |
| SHA256 | f20cabeb89ee2b0200b9cfeb1c158941e9cb0ee5e7f25486983b4992b8d09ae7 |
| SHA512 | 18f20c0252828fd813abcafef36c844422e65ce94c2028ad6cc58e1216848d43faee4760d720a4d24aa3a55b8781a2165c63b641f8b211523d862da9997c79db |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | cb83b6a4c538e6b22dfff2a2132d7a20 |
| SHA1 | 9f2196e822ac18bac56f63ed7467865558a61fa7 |
| SHA256 | 1a9140a5d327eb4ad1ae6a3263d76d2ecdbf9ca94346768048a2362074af4a88 |
| SHA512 | de805dbc14fe27638fc28000c2f04d18918339a93f36e090cfbf465d577ccf4783f90db8ee44da79800c0e755ff702e0a4eaf163f6f3c899bafa8afd4c02b28b |
memory/3532-125-0x00000000048D0000-0x00000000049A7000-memory.dmp
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
| MD5 | 4de07fa106d917b74e44bd624f3eeaef |
| SHA1 | dace1725097a94f1fdfad54f0eb2a2fbeab13a72 |
| SHA256 | 99f566b150282334d980ba5d41138ff81b88375ccac6a0ad366b3de194c63053 |
| SHA512 | 0c4524e7ee31d4ef11fd8a954e0ff02be57def4dc9c5550232338a07f7d27e3f8219d45b6e230f963ccdcd9b7b7daab5e0e3b60b45f8cab143159672398181c4 |
memory/768-145-0x00000000009C0000-0x0000000000A0E000-memory.dmp
memory/3532-151-0x00000000048D0000-0x00000000049A7000-memory.dmp
memory/768-152-0x00000000079C0000-0x0000000007C04000-memory.dmp
memory/768-153-0x00000000081C0000-0x0000000008766000-memory.dmp
memory/768-154-0x0000000007E20000-0x0000000007EB2000-memory.dmp
memory/768-159-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-155-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-156-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-168-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-170-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-166-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-164-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-162-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-161-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-174-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-172-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-182-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-196-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-200-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-218-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-216-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-212-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-210-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-209-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-206-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-202-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-198-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-214-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-204-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-194-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-192-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-190-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-188-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-186-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-184-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-180-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-178-0x00000000079C0000-0x0000000007BFE000-memory.dmp
memory/768-176-0x00000000079C0000-0x0000000007BFE000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 6ad33be36b785182e49efe422c87c47f |
| SHA1 | 23f67ce9e5b952a5eb5d9361901aad45ffdcddc3 |
| SHA256 | 6d6c1d168a20ffaae14c4a475bb9ce6db6b485856e79b6882183b60bbf9da06c |
| SHA512 | c97a21bae1ad61f788959657101ed38d391d3a138eafd7bda27b1ed3087e81f2d4a622c3296927bc46685d2230269efc0ba2e6dd2720cc5e7bd3f9a78ba4e188 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | f08679ed7634d4403a038e931169d544 |
| SHA1 | 432ec95e9af340001331e3763418a785665e4c53 |
| SHA256 | 40ad6b1f96d72e857f77e079031611326da17a82b4263387c0895f94a6d18305 |
| SHA512 | cc02f6bb0ec9ebc5954e59fde859c48b60489a5d8765c8b3d15934fc06c4352371b07c1cad7a6ce1c43712fe4594d0c55789f1aef3b6aafd10c27eaece6ff881 |
memory/768-5040-0x0000000005E40000-0x0000000005EC2000-memory.dmp
memory/768-5041-0x0000000005F90000-0x0000000005FDC000-memory.dmp
memory/768-5042-0x0000000005FE0000-0x0000000006034000-memory.dmp
memory/1224-5046-0x0000000000600000-0x000000000066E000-memory.dmp
memory/1224-5049-0x0000000005C20000-0x0000000005CBC000-memory.dmp
memory/1224-5050-0x00000000056E0000-0x0000000005746000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12
| MD5 | 2365869258df7a66a2121b802ca4afd9 |
| SHA1 | 73acc30a2edeb9d6830de559bb8a74f35168135d |
| SHA256 | d6b1932822bbd72a8e78c771717d992142348f67d625a42393719fefbe59b0ed |
| SHA512 | 795004bab536e128dbd81c188976d37c7b650efbfa5a80374df4c65a1049c27658f4620b7605583928eb167fcb69b4c99e4c8730c507b824a7bde9c7fb0e21f4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
| MD5 | 07505e3fc4a3b912e4508b77814a61f7 |
| SHA1 | 4348f99250bad6564884dad8cf99243818a7fcb5 |
| SHA256 | 81852acb2c660027276de58661404819b71cc45f78067ae43bff5d076818cd11 |
| SHA512 | 9befde1e19e0b5cb1b4aff37012f8d5894daa06ac96704f85db07a2886e174dcd4bc25b592e8ac916509bd266cda7c6e3e4b1b23013ed4149d4db13591f66db5 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8
| MD5 | 1bfe0a81db078ea084ff82fe545176fe |
| SHA1 | 50b116f578bd272922fa8eae94f7b02fd3b88384 |
| SHA256 | 5ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f |
| SHA512 | 37c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
| MD5 | 01f559e094633ee9c2057ade88388111 |
| SHA1 | e2b54cf8a3507086522f5e100a8b28cf6e40e666 |
| SHA256 | 531c2c8954126ceefe31b35a01774437d59578e0f5d9f060b17aace8aa0aa1fb |
| SHA512 | 72f04445b90a883f913e2e6c28afd4896953618aeeca2496260ba4c177a1676f19575cffeff51ece86b77a300ff692f7ada26aa34c4efd0e32d5ba09402c851e |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-01 23:16
Reported
2024-07-01 23:26
Platform
win10-20240611-en
Max time network
72s
Command Line
Signatures
Processes
Network
| Country | Destination | Domain | Proto |
| US | 199.232.210.172:80 | tcp | |
| US | 199.232.210.172:80 | tcp | |
| US | 8.8.8.8:53 | solutionhub.cc | udp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 126.128.67.172.in-addr.arpa | udp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| GB | 216.58.212.195:80 | www.gstatic.com | tcp |
| US | 8.8.8.8:53 | 195.212.58.216.in-addr.arpa | udp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | 195.187.250.142.in-addr.arpa | udp |
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-01 23:16
Reported
2024-07-01 23:24
Platform
win10v2004-20240508-en
Max time kernel
443s
Max time network
440s
Command Line
Signatures
AsyncRat
Downloads MZ/PE file
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation | C:\ProgramData\34vgn892c.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Downloads\ZharkBOT.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\ZharkBOT.exe | N/A |
| N/A | N/A | C:\ProgramData\34vgn892c.exe | N/A |
| N/A | N/A | C:\ProgramData\34vgn892c.exe | N/A |
| N/A | N/A | C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3v82v2vcc2 = "C:\\ProgramData\\34vgn892c.exe" | C:\ProgramData\34vgn892c.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3v82v2vcc2 = "C:\\ProgramData\\34vgn892c.exe" | C:\ProgramData\34vgn892c.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Uqwgg = "C:\\Users\\Admin\\AppData\\Local\\Uqwgg.exe" | C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1576 set thread context of 3244 | N/A | C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe |
Enumerates physical storage devices
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643494082548010" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command\ | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open\command | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Key deleted | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\ms-settings\shell\open | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://solutionhub.cc/download/ZharkBOT.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8be90ab58,0x7ff8be90ab68,0x7ff8be90ab78
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4528 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4388 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4900 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4612 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4708 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:8
C:\Users\Admin\Downloads\ZharkBOT.exe
"C:\Users\Admin\Downloads\ZharkBOT.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4404 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:1
C:\Users\Admin\Downloads\ZharkBOT.exe
"C:\Users\Admin\Downloads\ZharkBOT.exe"
C:\ProgramData\34vgn892c.exe
"C:\ProgramData\34vgn892c.exe"
C:\ProgramData\34vgn892c.exe
"C:\ProgramData\34vgn892c.exe"
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
"C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3884 --field-trial-handle=1896,i,8328993916761525045,3268471887603621692,131072 /prefetch:2
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | solutionhub.cc | udp |
| US | 172.67.128.126:443 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | a.nel.cloudflare.com | udp |
| US | 35.190.80.1:443 | a.nel.cloudflare.com | tcp |
| US | 35.190.80.1:443 | a.nel.cloudflare.com | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.128.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.80.190.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 172.67.128.126:443 | solutionhub.cc | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 249.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.197.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | solutionhub.cc | udp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| GB | 172.217.169.67:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | 10.2.21.104.in-addr.arpa | udp |
| GB | 172.217.169.67:80 | c.pki.goog | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | 67.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.mediafire.com | udp |
| US | 104.16.113.74:443 | www.mediafire.com | tcp |
| US | 8.8.8.8:53 | download2329.mediafire.com | udp |
| US | 199.91.155.70:443 | download2329.mediafire.com | tcp |
| US | 8.8.8.8:53 | 74.113.16.104.in-addr.arpa | udp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | 70.155.91.199.in-addr.arpa | udp |
| US | 20.163.171.63:8880 | tcp | |
| US | 8.8.8.8:53 | 63.171.163.20.in-addr.arpa | udp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 8.8.8.8:53 | 28.73.42.20.in-addr.arpa | udp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
| US | 104.21.2.10:443 | solutionhub.cc | tcp |
| US | 104.21.2.10:80 | solutionhub.cc | tcp |
Files
\??\pipe\crashpad_3164_HKQNDLJBVCDBDMKL
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\714f570a-6170-4151-b015-7ae593433bbf.tmp
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | d951739260dc13b2f89a9ca6d60a1c2a |
| SHA1 | 2183e94d0ab3fa721989ea0e90cfbe03352fb806 |
| SHA256 | 50d628a4eb4567b802472b7c7e0dc2170c9194bd34af5aba7655fe379b659c9e |
| SHA512 | 5e9c19cae1ceec6b06e9bc5be4a23bc154c05e4aaffe0666ca7e64c35e18fc88369394d5fd283bfcd08520c405b2c9372bb568fa15f46e24a1e031827027ec81 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 9db96ee7a86f274c0f9218c4d5358235 |
| SHA1 | ad425b81406eee8308ee5fac52815310359654f4 |
| SHA256 | 5b708e4bc0e4c9506ed6f6e4e3a19c1b689c1b7571643f44970d863756848c8d |
| SHA512 | 8bbe77aa55232bb0e6020f0b187b77ea6c3286ed68f59497470338b38066d9b224fbcfb0d385778b8b114f9ad7b8d65b804e7b0044f553f884d94c1a6dea75ec |
C:\Users\Admin\Downloads\ZharkBOT.exe
| MD5 | 339271af2bbdad0395a479c3ef2a714a |
| SHA1 | 4f38b94fdb7f3cc4cf9f79bbb4d4311b85f0e14b |
| SHA256 | 71769ebf723749783f5e79f7b8a43d6ef03582fca2d1d26cad69157b73004f2b |
| SHA512 | b93d038fd8159cf46f9568f60a22080b0a6e7b383028b47983465dd0c5fe1611a0e0eb99e141c2ee1604b29df6530605f489e05389904eff51048bd9d2e4eb0e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | ad03193b71807abbd74ac5b3ceb35405 |
| SHA1 | bd2f88339278d46216ce81300783a0430e0479d7 |
| SHA256 | 742fd572eb1584b3c90b011e9b3aabd5d7bbaf1b29d2b00ddafbb212ed42a48c |
| SHA512 | af1266b4c2e23ea43d6b83d19e57310e9cf766e9bc8db2d4727ff085cd8efa76262c5e59e5cc2809742136314fa922621d65dee51bdbb4ea2456757dcbd43d11 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | df27033e5763b24d9f8eafec16bc0a96 |
| SHA1 | 449da8dbcb9d7c54c265557a66d8316299fa805f |
| SHA256 | e0e57e15043875c536a347d2fd261ecc0132f6260b03f18bb37dcf26031f6f3b |
| SHA512 | 9d4c8da446c16bb6e39860cacaebc17bb883ec08f36dc3fa591d90812172b4393e83749d636818cdc94bba3685c68894f4fba9169a873f5cb82075af10324828 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | d37207d3b02956364ebf978afb14aae0 |
| SHA1 | 3d84160a429ee898c0d3428295d89c1e1457d9b2 |
| SHA256 | a979e94a87fe355dca3108890b40b6131e4fc6fcba0c5247f85ab8ecb98a7af2 |
| SHA512 | 0c99d7f1bbe7f52e402fa4381f145de68af3f5e338e42992c0f380764df2d47fbc99564ac9686f18a2d681d96485764cfa1cf1952701f91e77c2e021ea136899 |
memory/736-122-0x0000000003BA0000-0x0000000003C77000-memory.dmp
C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe
| MD5 | 4de07fa106d917b74e44bd624f3eeaef |
| SHA1 | dace1725097a94f1fdfad54f0eb2a2fbeab13a72 |
| SHA256 | 99f566b150282334d980ba5d41138ff81b88375ccac6a0ad366b3de194c63053 |
| SHA512 | 0c4524e7ee31d4ef11fd8a954e0ff02be57def4dc9c5550232338a07f7d27e3f8219d45b6e230f963ccdcd9b7b7daab5e0e3b60b45f8cab143159672398181c4 |
memory/1576-140-0x0000000000FA0000-0x0000000000FEE000-memory.dmp
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12
| MD5 | 2365869258df7a66a2121b802ca4afd9 |
| SHA1 | 73acc30a2edeb9d6830de559bb8a74f35168135d |
| SHA256 | d6b1932822bbd72a8e78c771717d992142348f67d625a42393719fefbe59b0ed |
| SHA512 | 795004bab536e128dbd81c188976d37c7b650efbfa5a80374df4c65a1049c27658f4620b7605583928eb167fcb69b4c99e4c8730c507b824a7bde9c7fb0e21f4 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
| MD5 | 419ff7f66f5baa6a48bae9623254f0b9 |
| SHA1 | 7d042f981a2b62bdf129b2be49ac69d41992742a |
| SHA256 | 00952c1bdfd21c2b86562b631d21a3ea89a8512b292ba49ff4cac67551b7a33f |
| SHA512 | d04fe034cbe3c77778095a2fe99767836db2583d6e127f520337fbed3b5769a8c1f04a3ba6bdf69245c30784c2b5ce0a9a20cdad5f1423be0a1e530f189448e9 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8
| MD5 | 1bfe0a81db078ea084ff82fe545176fe |
| SHA1 | 50b116f578bd272922fa8eae94f7b02fd3b88384 |
| SHA256 | 5ba8817f13eee00e75158bad93076ab474a068c6b52686579e0f728fda68499f |
| SHA512 | 37c582f3f09f8d80529608c09041295d1644bcc9de6fb8c4669b05339b0dd870f9525abc5eed53ad06a94b51441275504bc943c336c5beb63b53460ba836ca8d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
| MD5 | a9ae5b97b090f3e2021dd829b50b0537 |
| SHA1 | c0153e199048ab0b8329538b7e6480a07e62c7ff |
| SHA256 | c5e89ee28840a822039be20709213c55f50dd0a3de12869299e31b38ebe63376 |
| SHA512 | 34eb91e7331ca5b93e1669e97514d11f392df4440cc1952f618c7200551f9b6c95310d59e6ffc67a9d6bbf09d766523ebe34f8b38172894bf383a1ed457969a9 |
memory/736-153-0x0000000003BA0000-0x0000000003C77000-memory.dmp
memory/1576-154-0x0000000007C30000-0x0000000007E74000-memory.dmp
memory/1576-155-0x0000000008420000-0x00000000089C4000-memory.dmp
memory/1576-156-0x0000000007F50000-0x0000000007FE2000-memory.dmp
memory/1576-158-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-162-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-170-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-180-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-178-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-176-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-174-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-172-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-166-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-168-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-160-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-164-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-157-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-182-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-184-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-188-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-186-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-202-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-198-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-210-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-220-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-218-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-216-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-214-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-208-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-206-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-204-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-200-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-212-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-196-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-194-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-192-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-190-0x0000000007C30000-0x0000000007E6E000-memory.dmp
memory/1576-5019-0x00000000060C0000-0x0000000006142000-memory.dmp
memory/1576-5020-0x00000000065F0000-0x000000000663C000-memory.dmp
memory/1576-5021-0x0000000006640000-0x0000000006694000-memory.dmp
memory/3244-5025-0x0000000000400000-0x000000000046E000-memory.dmp
memory/3244-5026-0x0000000005C10000-0x0000000005CAC000-memory.dmp
memory/3244-5027-0x0000000005CB0000-0x0000000005D16000-memory.dmp