Analysis Overview
SHA256
a12269430ce9e0791ad5dd7248d2e2ae14ddd2ade4a20af3987b1256218baa51
Threat Level: Likely malicious
The file x54uwn3pph.rar was found to be: Likely malicious.
Malicious Activity Summary
Stops running service(s)
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Reads user/profile data of web browsers
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Obfuscated Files or Information: Command Obfuscation
Looks up external IP address via web service
UPX packed file
Launches sc.exe
System Network Configuration Discovery: Wi-Fi Discovery
Event Triggered Execution: Netsh Helper DLL
Browser Information Discovery
Enumerates physical storage devices
Program crash
Unsigned PE
System Location Discovery: System Language Discovery
Detects Pyinstaller
Command and Scripting Interpreter: JavaScript
Suspicious use of WriteProcessMemory
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Modifies data under HKEY_USERS
Suspicious use of SetWindowsHookEx
Modifies registry key
Enumerates system info in registry
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-10-27 13:36
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral17
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1750s
Max time network
1171s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\tcc.exe
"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\tcc.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 105.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 27.73.42.20.in-addr.arpa | udp |
Files
memory/1044-1-0x00007FFDC4AB0000-0x00007FFDC4B15000-memory.dmp
memory/1044-0-0x00007FF6A7280000-0x00007FF6A7296000-memory.dmp
Analysis: behavioral18
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1668s
Max time network
1160s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\x86_64-win32-tcc.exe
"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\x86_64-win32-tcc.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 2.173.189.20.in-addr.arpa | udp |
Files
memory/1400-0-0x00007FF6F76A0000-0x00007FF6F770A000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1363s
Max time network
1154s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 984 wrote to memory of 1364 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 984 wrote to memory of 1364 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 984 wrote to memory of 1364 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\libiconv-2.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\libiconv-2.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1364 -ip 1364
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 576
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 138.201.86.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 91.16.208.104.in-addr.arpa | udp |
Files
memory/1364-0-0x0000000066200000-0x00000000662EB000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1790s
Max time network
1154s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe
"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc" -E -xc -DRC_INVOKED -
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc -E -xc -DRC_INVOKED -
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe
"C:/Users/Admin/AppData/Local/Temp/x54uwn3pph/Compilers/MinGW64/bin/../libexec/gcc/x86_64-w64-mingw32/4.9.2/cc1.exe" "-E" "-quiet" "-iprefix" "C:/Users/Admin/AppData/Local/Temp/x54uwn3pph/Compilers/MinGW64/bin/../lib/gcc/x86_64-w64-mingw32/4.9.2/" "-D_REENTRANT" "-D" "RC_INVOKED" "-" "-mtune=generic" "-march=x86-64"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 11.179.89.13.in-addr.arpa | udp |
Files
memory/3616-0-0x0000000000401000-0x0000000000DAC000-memory.dmp
memory/3196-3-0x0000000066200000-0x00000000662EB000-memory.dmp
memory/3196-2-0x0000000000400000-0x00000000004CE000-memory.dmp
memory/3316-1-0x0000000000400000-0x0000000000502000-memory.dmp
memory/3616-4-0x0000000000400000-0x0000000001149000-memory.dmp
memory/3616-10-0x0000000065600000-0x0000000065619000-memory.dmp
memory/3616-9-0x000000006FE80000-0x000000006FED7000-memory.dmp
memory/3616-8-0x000000006A780000-0x000000006A86A000-memory.dmp
memory/3616-7-0x0000000066200000-0x00000000662EB000-memory.dmp
memory/3616-6-0x0000000070F00000-0x0000000070F24000-memory.dmp
memory/3616-5-0x0000000068C80000-0x0000000068CEF000-memory.dmp
Analysis: behavioral5
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1692s
Max time network
1152s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 764 wrote to memory of 4028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 764 wrote to memory of 4028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 764 wrote to memory of 4028 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libcloog-isl-3.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libcloog-isl-3.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4028 -ip 4028
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 604
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.79.70.13.in-addr.arpa | udp |
Files
memory/4028-0-0x0000000070F00000-0x0000000070F24000-memory.dmp
memory/4028-2-0x000000006A780000-0x000000006A86A000-memory.dmp
memory/4028-1-0x0000000068C80000-0x0000000068CEF000-memory.dmp
Analysis: behavioral7
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1366s
Max time network
1154s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3080 wrote to memory of 1004 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3080 wrote to memory of 1004 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3080 wrote to memory of 1004 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libiconv-2.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libiconv-2.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1004 -ip 1004
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 600
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 72.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.16.208.104.in-addr.arpa | udp |
Files
memory/1004-0-0x0000000066200000-0x00000000662EB000-memory.dmp
Analysis: behavioral12
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1359s
Max time network
1150s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bcheck.o
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 138.201.86.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.143.182.52.in-addr.arpa | udp |
Files
Analysis: behavioral13
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1337s
Max time network
1161s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-dll.o
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 105.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 27.73.42.20.in-addr.arpa | udp |
Files
Analysis: behavioral19
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1799s
Max time network
1120s
Command Line
Signatures
Stops running service(s)
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\main.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\main.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\empyrean = "C:\\Users\\Admin\\AppData\\Roaming\\empyrean\\run.bat" | C:\Windows\system32\reg.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ipapi.co | N/A | N/A |
| N/A | ipapi.co | N/A | N/A |
| N/A | ipapi.co | N/A | N/A |
| N/A | ipapi.co | N/A | N/A |
| N/A | ipapi.co | N/A | N/A |
Obfuscated Files or Information: Command Obfuscation
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\sc.exe | N/A |
Browser Information Discovery
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
| Description | Indicator | Process | Target |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\sc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\sc.exe | N/A |
System Network Configuration Discovery: Wi-Fi Discovery
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\reg.exe | N/A |
| N/A | N/A | C:\Windows\system32\reg.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\main.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 34 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 35 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 36 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 34 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 35 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 36 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 34 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
| Token: 35 | N/A | C:\Windows\System32\wbem\WMIC.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe
"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe"
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAYgBwACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAeQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAbQBqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAbQBuACMAPgA="
C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe
"C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c sc start FairplayKD > NUL 2>&1
C:\Users\Admin\AppData\Local\Temp\main.exe
"C:\Users\Admin\AppData\Local\Temp\main.exe"
C:\Windows\SysWOW64\sc.exe
sc start FairplayKD
C:\Users\Admin\AppData\Local\Temp\main.exe
"C:\Users\Admin\AppData\Local\Temp\main.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c sc stop %c > NUL 2>&1
C:\Windows\SysWOW64\sc.exe
sc stop %c
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"
C:\Windows\System32\wbem\WMIC.exe
C:\Windows\System32\wbem\WMIC.exe csproduct get uuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f"
C:\Windows\system32\reg.exe
reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f"
C:\Windows\system32\reg.exe
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"
C:\Windows\System32\wbem\WMIC.exe
C:\Windows\System32\wbem\WMIC.exe csproduct get uuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"
C:\Windows\System32\wbem\WMIC.exe
C:\Windows\System32\wbem\WMIC.exe csproduct get uuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"
C:\Windows\System32\wbem\WMIC.exe
C:\Windows\System32\wbem\WMIC.exe csproduct get uuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
C:\Windows\system32\netsh.exe
netsh wlan show profiles
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
C:\Windows\system32\netsh.exe
netsh wlan show profiles
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
C:\Windows\system32\netsh.exe
netsh wlan show profiles
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ipapi.co | udp |
| US | 104.26.9.44:443 | ipapi.co | tcp |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.128.233:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 44.9.26.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 233.128.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | raw.githubusercontent.com | udp |
| US | 185.199.108.133:443 | raw.githubusercontent.com | tcp |
| US | 8.8.8.8:53 | 133.108.199.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.cloudflare.com | udp |
| US | 104.16.123.96:443 | www.cloudflare.com | tcp |
| US | 104.26.9.44:443 | ipapi.co | tcp |
| US | 104.16.123.96:443 | www.cloudflare.com | tcp |
| US | 104.26.9.44:443 | ipapi.co | tcp |
| US | 8.8.8.8:53 | 96.123.16.104.in-addr.arpa | udp |
| US | 104.16.123.96:443 | www.cloudflare.com | tcp |
| US | 104.26.9.44:443 | ipapi.co | tcp |
| US | 162.159.128.233:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.201.86.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.73.42.20.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe
| MD5 | 6b1ae040f09a43a4f0eee6fd964e2a47 |
| SHA1 | 5d5ae0e6d89612fa55286f12f3a09443408ac1df |
| SHA256 | d1163ec121ee6bdd11496c227b5f09a69cd2172aca93d111fac1be0cf73be0f2 |
| SHA512 | e6a7ad8d8245b7fa009b77c77e5d85059bcc6802247b72a5bf927a97390650d446f83984c43a3fd6cd5f5a35f747bda6b5d1e408aa59f212a856cc9eaca861a1 |
memory/1876-7-0x000000007406E000-0x000000007406F000-memory.dmp
memory/1876-12-0x0000000004C70000-0x0000000004CA6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\main.exe
| MD5 | 20e800847b1b4b31342eec351c90e791 |
| SHA1 | eacead464cf795663624f235d27cad390e4fd621 |
| SHA256 | e1300ce31905bea06649b249550555180f7993901d4391c6d0d8dfdc4276b703 |
| SHA512 | a91a3e3ba287991fa4ed5506d7aa3663f665fbe0d67d765865fc2d65c6e8a7c2be2fb562eb34bf28b87d5a8404c625545cd7a424c91899eb6c1b6260f497a131 |
memory/1876-15-0x0000000005430000-0x0000000005A58000-memory.dmp
memory/1876-16-0x0000000074060000-0x0000000074810000-memory.dmp
memory/1876-19-0x0000000074060000-0x0000000074810000-memory.dmp
memory/1876-64-0x0000000005AA0000-0x0000000005AC2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dt3ih4gd.snp.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/1876-95-0x0000000005BC0000-0x0000000005C26000-memory.dmp
memory/1876-94-0x0000000005B50000-0x0000000005BB6000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\python310.dll
| MD5 | 69d4f13fbaeee9b551c2d9a4a94d4458 |
| SHA1 | 69540d8dfc0ee299a7ff6585018c7db0662aa629 |
| SHA256 | 801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046 |
| SHA512 | 8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378 |
memory/1876-150-0x0000000005D30000-0x0000000006084000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\VCRUNTIME140.dll
| MD5 | 870fea4e961e2fbd00110d3783e529be |
| SHA1 | a948e65c6f73d7da4ffde4e8533c098a00cc7311 |
| SHA256 | 76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644 |
| SHA512 | 0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88 |
memory/2708-151-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\base_library.zip
| MD5 | fbd6be906ac7cd45f1d98f5cb05f8275 |
| SHA1 | 5d563877a549f493da805b4d049641604a6a0408 |
| SHA256 | ae35709e6b8538827e3999e61a0345680c5167962296ac7bef62d6b813227fb0 |
| SHA512 | 1547b02875f3e547c4f5e15c964719c93d7088c7f4fd044f6561bebd29658a54ef044211f9d5cfb4570ca49ed0f17b08011d27fe85914e8c3ea12024c8071e8a |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\libffi-7.dll
| MD5 | b5150b41ca910f212a1dd236832eb472 |
| SHA1 | a17809732c562524b185953ffe60dfa91ba3ce7d |
| SHA256 | 1a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a |
| SHA512 | 9e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6 |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_bz2.pyd
| MD5 | 758fff1d194a7ac7a1e3d98bcf143a44 |
| SHA1 | de1c61a8e1fb90666340f8b0a34e4d8bfc56da07 |
| SHA256 | f5e913a9f2adf7d599ea9bb105e144ba11699bbcb1514e73edcf7e062354e708 |
| SHA512 | 468d7c52f14812d5bde1e505c95cb630e22d71282bda05bf66324f31560bfa06095cf60fc0d34877f8b361ccd65a1b61d0fd1f91d52facb0baf8e74f3fed31cc |
memory/2708-168-0x00007FFF3FF50000-0x00007FFF3FF7D000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_queue.pyd
| MD5 | 0d267bb65918b55839a9400b0fb11aa2 |
| SHA1 | 54e66a14bea8ae551ab6f8f48d81560b2add1afc |
| SHA256 | 13ee41980b7d0fb9ce07f8e41ee6a309e69a30bbf5b801942f41cbc357d59e9c |
| SHA512 | c2375f46a98e44f54e2dd0a5cc5f016098500090bb78de520dc5e05aef8e6f11405d8f6964850a03060caed3628d0a6303091cba1f28a0aa9b3b814217d71e56 |
memory/1876-187-0x0000000006220000-0x000000000623E000-memory.dmp
memory/1876-188-0x0000000006770000-0x00000000067BC000-memory.dmp
memory/2708-186-0x00007FFF40160000-0x00007FFF4016D000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\pythoncom310.dll
| MD5 | 9051abae01a41ea13febdea7d93470c0 |
| SHA1 | b06bd4cd4fd453eb827a108e137320d5dc3a002f |
| SHA256 | f12c8141d4795719035c89ff459823ed6174564136020739c106f08a6257b399 |
| SHA512 | 58d8277ec4101ad468dd8c4b4a9353ab684ecc391e5f9db37de44d5c3316c17d4c7a5ffd547ce9b9a08c56e3dd6d3c87428eae12144dfb72fc448b0f2cfc47da |
memory/2708-190-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\win32api.pyd
| MD5 | 561f419a2b44158646ee13cd9af44c60 |
| SHA1 | 93212788de48e0a91e603d74f071a7c8f42fe39b |
| SHA256 | 631465da2a1dad0cb11cd86b14b4a0e4c7708d5b1e8d6f40ae9e794520c3aaf7 |
| SHA512 | d76ab089f6dc1beffd5247e81d267f826706e60604a157676e6cbc3b3447f5bcee66a84bf35c21696c020362fadd814c3e0945942cdc5e0dfe44c0bca169945c |
memory/2708-194-0x00007FFF40730000-0x00007FFF4075B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_uuid.pyd
| MD5 | 81dfa68ca3cb20ced73316dbc78423f6 |
| SHA1 | 8841cf22938aa6ee373ff770716bb9c6d9bc3e26 |
| SHA256 | d0cb6dd98a2c9d4134c6ec74e521bad734bc722d6a3b4722428bf79e7b66f190 |
| SHA512 | e24288ae627488251682cd47c1884f2dc5f4cd834d7959b9881e5739c42d91fd0a30e75f0de77f5b5a0d63d9baebcafa56851e7e40812df367fd433421c0ccdb |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\libcrypto-1_1.dll
| MD5 | da5fe6e5cfc41381025994f261df7148 |
| SHA1 | 13998e241464952d2d34eb6e8ecfcd2eb1f19a64 |
| SHA256 | de045c36ae437a5b40fc90a8a7cc037facd5b7e307cfcf9a9087c5f1a6a2cf18 |
| SHA512 | a0d7ebf83204065236439d495eb3c97be093c41daac2e6cfbbb1aa8ffeac049402a3dea7139b1770d2e1a45e08623a56a94d64c8f0c5be74c5bae039a2bc6ca9 |
memory/2708-216-0x000001F0DA2C0000-0x000001F0DA635000-memory.dmp
memory/2708-215-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\unicodedata.pyd
| MD5 | ca3baebf8725c7d785710f1dfbb2736d |
| SHA1 | 8f9aec2732a252888f3873967d8cc0139ff7f4e5 |
| SHA256 | f2d03a39556491d1ace63447b067b38055f32f5f1523c01249ba18052c599b4c |
| SHA512 | 5c2397e4dcb361a154cd3887c229bcf7ef980acbb4b851a16294d5df6245b2615cc4b42f6a95cf1d3c49b735c2f7025447247d887ccf4cd964f19f14e4533470 |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\sqlite3.dll
| MD5 | b70d218798c0fec39de1199c796ebce8 |
| SHA1 | 73b9f8389706790a0fec3c7662c997d0a238a4a0 |
| SHA256 | 4830e8d4ae005a73834371fe7bb5b91ca8a4c4c3a4b9a838939f18920f10faff |
| SHA512 | 2ede15cc8a229bfc599980ce7180a7a3c37c0264415470801cf098ef4dac7bcf857821f647614490c1b0865882619a24e3ac0848b5aea1796fad054c0dd6f718 |
memory/2708-248-0x00007FFF3EA50000-0x00007FFF3EA5B000-memory.dmp
memory/2708-264-0x00007FFF37810000-0x00007FFF37832000-memory.dmp
memory/2708-271-0x00007FFF341C0000-0x00007FFF341DE000-memory.dmp
memory/2708-275-0x00007FFF30040000-0x00007FFF30292000-memory.dmp
memory/2708-273-0x00007FFF31DF0000-0x00007FFF31E19000-memory.dmp
memory/2708-270-0x00007FFF341E0000-0x00007FFF341F1000-memory.dmp
memory/2708-269-0x00007FFF37110000-0x00007FFF3715D000-memory.dmp
memory/2708-268-0x00007FFF37160000-0x00007FFF37179000-memory.dmp
memory/2708-267-0x00007FFF377D0000-0x00007FFF377E6000-memory.dmp
memory/2708-266-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp
memory/2708-265-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\downloads_db
| MD5 | f310cf1ff562ae14449e0167a3e1fe46 |
| SHA1 | 85c58afa9049467031c6c2b17f5c12ca73bb2788 |
| SHA256 | e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855 |
| SHA512 | 1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad |
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\vault\cookies.txt
| MD5 | e7df649e2ab84cdbca0dcb24d07cfe15 |
| SHA1 | ee4579c33e15e6ba653d30cb6d85b8fbc68ea1e4 |
| SHA256 | de5c66336ba01afb107f1440586597e955d0e5b2ec1a14e78b326fd57288e3b1 |
| SHA512 | 693ada9e83e503fd31ca0591b5045bee4cd0a8d5aeb142c5e8b9fd546a614159917a49fa31edf06df08f666c3f9cef1ee0019e8be24c6ffec8d2ea97e2f308f4 |
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\downloads_db
| MD5 | 9618e15b04a4ddb39ed6c496575f6f95 |
| SHA1 | 1c28f8750e5555776b3c80b187c5d15a443a7412 |
| SHA256 | a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab |
| SHA512 | f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26 |
memory/2708-263-0x00007FFF377F0000-0x00007FFF3780B000-memory.dmp
memory/2708-262-0x00007FFF3BF70000-0x00007FFF3BF80000-memory.dmp
memory/2708-261-0x00007FFF3BF50000-0x00007FFF3BF64000-memory.dmp
memory/2708-260-0x00007FFF3BF80000-0x00007FFF3BF95000-memory.dmp
memory/2708-259-0x00007FFF3BFA0000-0x00007FFF3BFAC000-memory.dmp
memory/2708-258-0x00007FFF3BFB0000-0x00007FFF3BFC2000-memory.dmp
memory/2708-257-0x00007FFF3DA10000-0x00007FFF3DA1C000-memory.dmp
memory/2708-256-0x00007FFF3D160000-0x00007FFF3D16D000-memory.dmp
memory/2708-255-0x00007FFF3D170000-0x00007FFF3D17C000-memory.dmp
memory/2708-254-0x00007FFF3D180000-0x00007FFF3D18C000-memory.dmp
memory/2708-253-0x00007FFF3D190000-0x00007FFF3D19B000-memory.dmp
memory/2708-252-0x00007FFF3D1A0000-0x00007FFF3D1AB000-memory.dmp
memory/2708-251-0x00007FFF3D1B0000-0x00007FFF3D1BC000-memory.dmp
memory/2708-250-0x00007FFF3EA40000-0x00007FFF3EA4C000-memory.dmp
memory/2708-249-0x000001F0DA2C0000-0x000001F0DA635000-memory.dmp
memory/2708-247-0x00007FFF3DA20000-0x00007FFF3DA2E000-memory.dmp
memory/2708-246-0x00007FFF3DA30000-0x00007FFF3DA3D000-memory.dmp
memory/2708-245-0x00007FFF3DA40000-0x00007FFF3DA4C000-memory.dmp
memory/2708-244-0x00007FFF3EA30000-0x00007FFF3EA3B000-memory.dmp
memory/2708-243-0x00007FFF3EA60000-0x00007FFF3EA6C000-memory.dmp
memory/2708-242-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp
memory/2708-241-0x00007FFF31280000-0x00007FFF31338000-memory.dmp
memory/2708-240-0x00007FFF3EA90000-0x00007FFF3EA9B000-memory.dmp
memory/2708-239-0x00007FFF3EAF0000-0x00007FFF3EB1E000-memory.dmp
memory/2708-238-0x00007FFF3F5F0000-0x00007FFF3F5FB000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\Crypto\Cipher\_raw_ecb.pyd
| MD5 | f94726f6b584647142ea6d5818b0349d |
| SHA1 | 4aa9931c0ff214bf520c5e82d8e73ceeb08af27c |
| SHA256 | b98297fd093e8af7fca2628c23a9916e767540c3c6fa8894394b5b97ffec3174 |
| SHA512 | 2b40a9b39f5d09eb8d7ddad849c8a08ab2e73574ee0d5db132fe8c8c3772e60298e0545516c9c26ee0b257ebda59cfe1f56ef6c4357ef5be9017c4db4770d238 |
memory/2708-235-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp
memory/2708-233-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_sqlite3.pyd
| MD5 | 7b45afc909647c373749ef946c67d7cf |
| SHA1 | 81f813c1d8c4b6497c01615dcb6aa40b92a7bd20 |
| SHA256 | a5f39bfd2b43799922e303a3490164c882f6e630777a3a0998e89235dc513b5e |
| SHA512 | fe67e58f30a2c95d7d42a102ed818f4d57baa524c5c2d781c933de201028c75084c3e836ff4237e066f3c7dd6a5492933c3da3fee76eb2c50a6915996ef6d7fb |
memory/2708-229-0x00007FFF31160000-0x00007FFF31278000-memory.dmp
memory/2708-228-0x00007FFF3EAA0000-0x00007FFF3EAC7000-memory.dmp
memory/2708-227-0x00007FFF44250000-0x00007FFF4425B000-memory.dmp
memory/2708-225-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\charset_normalizer\md__mypyc.cp310-win_amd64.pyd
| MD5 | 150731368d678f5b2f9ea8cb1a966b8a |
| SHA1 | 8263055aee278b6724e30aff7bd4bd471bb1c904 |
| SHA256 | 08bbccf9be3982bbb356e5df1e6fddaa94bb5f12b765bca7bd5701c86141f814 |
| SHA512 | a5e984f9995e13fefd8a1750b8fef7670cfef11ff019880af06d4dff453416b43e077084f529e37fc24f4a70c1951cfc101f2611d7c860924bbf2922a98027a8 |
memory/2708-222-0x00007FFF3FDC0000-0x00007FFF3FDD4000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\charset_normalizer\md.cp310-win_amd64.pyd
| MD5 | ac03714161da507e824756742a877da9 |
| SHA1 | 702dbd2296ca50f6502bc5aac5b826b63cf9e200 |
| SHA256 | cafc9c2befc85af6cc0f9cf0fa7681bae89c9acf511cadc39a0cee77d174b2c2 |
| SHA512 | 6b773b2f31512211a0944391733b77f25ef720d07a4057ab8432941950403faced50c8bc3166b36f648e6394bdf0d9943ccd81e689622558719dfe782c59bb2c |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_hashlib.pyd
| MD5 | 0d723bc34592d5bb2b32cf259858d80e |
| SHA1 | eacfabd037ba5890885656f2485c2d7226a19d17 |
| SHA256 | f2b927aaa856d23f628b01380d5a19bfe9233db39c9078c0e0585d376948c13f |
| SHA512 | 3e79455554d527d380adca39ac10dbf3914ca4980d8ee009b7daf30aeb4e9359d9d890403da9cc2b69327c695c57374c390fa780a8fd6148bbea3136138ead33 |
memory/2708-212-0x00007FFF31280000-0x00007FFF31338000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\libssl-1_1.dll
| MD5 | 48d792202922fffe8ea12798f03d94de |
| SHA1 | f8818be47becb8ccf2907399f62019c3be0efeb5 |
| SHA256 | 8221a76831a103b2b2ae01c3702d0bba4f82f2afd4390a3727056e60b28650cc |
| SHA512 | 69f3a8b556dd517ae89084623f499ef89bd0f97031e3006677ceed330ed13fcc56bf3cde5c9ed0fc6c440487d13899ffda775e6a967966294cadfd70069b2833 |
memory/2708-209-0x00007FFF3EAF0000-0x00007FFF3EB1E000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_ssl.pyd
| MD5 | 1e643c629f993a63045b0ff70d6cf7c6 |
| SHA1 | 9af2d22226e57dc16c199cad002e3beb6a0a0058 |
| SHA256 | 4a50b4b77bf9e5d6f62c7850589b80b4caa775c81856b0d84cb1a73d397eb38a |
| SHA512 | 9d8cd6e9c03880cc015e87059db28ff588881679f8e3f5a26a90f13e2c34a5bd03fb7329d9a4e33c4a01209c85a36fc999e77d9ece42cebdb738c2f1fd6775af |
memory/2708-205-0x00007FFF40710000-0x00007FFF4072C000-memory.dmp
memory/2708-204-0x00007FFF44260000-0x00007FFF4426A000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\psutil\_psutil_windows.pyd
| MD5 | fb17b2f2f09725c3ffca6345acd7f0a8 |
| SHA1 | b8d747cc0cb9f7646181536d9451d91d83b9fc61 |
| SHA256 | 9c7d401418db14353db85b54ff8c7773ee5d17cbf9a20085fde4af652bd24fc4 |
| SHA512 | b4acb60045da8639779b6bb01175b13344c3705c92ea55f9c2942f06c89e5f43cedae8c691836d63183cacf2d0a98aa3bcb0354528f1707956b252206991bf63 |
memory/2708-200-0x00007FFF3FA80000-0x00007FFF3FAC2000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_decimal.pyd
| MD5 | eb45ea265a48348ce0ac4124cb72df22 |
| SHA1 | ecdc1d76a205f482d1ed9c25445fa6d8f73a1422 |
| SHA256 | 3881f00dbc4aadf9e87b44c316d93425a8f6ba73d72790987226238defbc7279 |
| SHA512 | f7367bf2a2d221a7508d767ad754b61b2b02cdd7ae36ae25b306f3443d4800d50404ac7e503f589450ed023ff79a2fb1de89a30a49aa1dd32746c3e041494013 |
memory/2708-193-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp
memory/2708-185-0x00007FFF3FAD0000-0x00007FFF3FAFE000-memory.dmp
memory/2708-184-0x00007FFF40170000-0x00007FFF4017D000-memory.dmp
memory/1876-183-0x0000000074060000-0x0000000074810000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\VCRUNTIME140_1.dll
| MD5 | bba9680bc310d8d25e97b12463196c92 |
| SHA1 | 9a480c0cf9d377a4caedd4ea60e90fa79001f03a |
| SHA256 | e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab |
| SHA512 | 1575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739 |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\pywintypes310.dll
| MD5 | 6f2aa8fa02f59671f99083f9cef12cda |
| SHA1 | 9fd0716bcde6ac01cd916be28aa4297c5d4791cd |
| SHA256 | 1a15d98d4f9622fa81b60876a5f359707a88fbbbae3ae4e0c799192c378ef8c6 |
| SHA512 | f5d5112e63307068cdb1d0670fe24b65a9f4942a39416f537bdbc17dedfd99963861bf0f4e94299cdce874816f27b3d86c4bebb889c3162c666d5ee92229c211 |
memory/2708-176-0x00007FFF401F0000-0x00007FFF40209000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\select.pyd
| MD5 | 72009cde5945de0673a11efb521c8ccd |
| SHA1 | bddb47ac13c6302a871a53ba303001837939f837 |
| SHA256 | 5aaa15868421a46461156e7817a69eeeb10b29c1e826a9155b5f8854facf3dca |
| SHA512 | d00a42700c9201f23a44fd9407fea7ea9df1014c976133f33ff711150727bf160941373d53f3a973f7dd6ca7b5502e178c2b88ea1815ca8bce1a239ed5d8256d |
memory/2708-173-0x00007FFF3FF10000-0x00007FFF3FF44000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_socket.pyd
| MD5 | afd296823375e106c4b1ac8b39927f8b |
| SHA1 | b05d811e5a5921d5b5cc90b9e4763fd63783587b |
| SHA256 | e423a7c2ce5825dfdd41cfc99c049ff92abfb2aa394c85d0a9a11de7f8673007 |
| SHA512 | 95e98a24be9e603b2870b787349e2aa7734014ac088c691063e4078e11a04898c9c547d6998224b1b171fc4802039c3078a28c7e81d59f6497f2f9230d8c9369 |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\pyexpat.pyd
| MD5 | 5a328b011fa748939264318a433297e2 |
| SHA1 | d46dd2be7c452e5b6525e88a2d29179f4c07de65 |
| SHA256 | e8a81b47029e8500e0f4e04ccf81f8bdf23a599a2b5cd627095678cdf2fabc14 |
| SHA512 | 06fa8262378634a42f5ab8c1e5f6716202544c8b304de327a08aa20c8f888114746f69b725ed3088d975d09094df7c3a37338a93983b957723aa2b7fda597f87 |
memory/2708-167-0x00007FFF406B0000-0x00007FFF406C9000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_lzma.pyd
| MD5 | abceeceaeff3798b5b0de412af610f58 |
| SHA1 | c3c94c120b5bed8bccf8104d933e96ac6e42ca90 |
| SHA256 | 216aa4bb6f62dd250fd6d2dcde14709aa82e320b946a21edeec7344ed6c2c62e |
| SHA512 | 3e1a2eb86605aa851a0c5153f7be399f6259ecaad86dbcbf12eeae5f985dc2ea2ab25683285e02b787a5b75f7df70b4182ae8f1567946f99ad2ec7b27d4c7955 |
memory/2708-161-0x00007FFF407F0000-0x00007FFF407FF000-memory.dmp
memory/2708-160-0x00007FFF40210000-0x00007FFF40234000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI40202\python3.dll
| MD5 | c17b7a4b853827f538576f4c3521c653 |
| SHA1 | 6115047d02fbbad4ff32afb4ebd439f5d529485a |
| SHA256 | d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68 |
| SHA512 | 8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7 |
C:\Users\Admin\AppData\Local\Temp\_MEI40202\_ctypes.pyd
| MD5 | 6ca9a99c75a0b7b6a22681aa8e5ad77b |
| SHA1 | dd1118b7d77be6bb33b81da65f6b5dc153a4b1e8 |
| SHA256 | d39390552c55d8fd4940864905cd4437bc3f8efe7ff3ca220543b2c0efab04f8 |
| SHA512 | b0b5f2979747d2f6796d415dd300848f32b4e79ede59827ac447af0f4ea8709b60d6935d09e579299b3bc54b6c0f10972f17f6c0d1759c5388ad5b14689a23fe |
memory/1876-325-0x00000000071E0000-0x0000000007212000-memory.dmp
memory/1876-326-0x0000000071090000-0x00000000710DC000-memory.dmp
memory/1876-336-0x00000000067F0000-0x000000000680E000-memory.dmp
memory/1876-337-0x0000000007220000-0x00000000072C3000-memory.dmp
memory/1876-338-0x0000000007BA0000-0x000000000821A000-memory.dmp
memory/1876-339-0x0000000007550000-0x000000000756A000-memory.dmp
memory/2708-340-0x00007FFF37810000-0x00007FFF37832000-memory.dmp
memory/1876-341-0x00000000075C0000-0x00000000075CA000-memory.dmp
memory/1876-342-0x00000000077E0000-0x0000000007876000-memory.dmp
memory/1876-343-0x0000000007750000-0x0000000007761000-memory.dmp
memory/1876-344-0x0000000007790000-0x000000000779E000-memory.dmp
memory/1876-345-0x00000000077A0000-0x00000000077B4000-memory.dmp
memory/1876-346-0x0000000007880000-0x000000000789A000-memory.dmp
memory/1876-347-0x00000000077D0000-0x00000000077D8000-memory.dmp
memory/2708-357-0x00007FFF3FAD0000-0x00007FFF3FAFE000-memory.dmp
memory/2708-370-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp
memory/2708-371-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp
memory/2708-365-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp
memory/2708-364-0x00007FFF31280000-0x00007FFF31338000-memory.dmp
memory/2708-363-0x00007FFF3EAF0000-0x00007FFF3EB1E000-memory.dmp
memory/2708-362-0x00007FFF40710000-0x00007FFF4072C000-memory.dmp
memory/2708-358-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp
memory/2708-348-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp
memory/2708-354-0x00007FFF401F0000-0x00007FFF40209000-memory.dmp
memory/2708-349-0x00007FFF40210000-0x00007FFF40234000-memory.dmp
memory/1876-374-0x0000000074060000-0x0000000074810000-memory.dmp
memory/2708-375-0x00007FFF377D0000-0x00007FFF377E6000-memory.dmp
memory/2708-376-0x00007FFF30040000-0x00007FFF30292000-memory.dmp
memory/2708-405-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp
memory/2708-409-0x00007FFF40160000-0x00007FFF4016D000-memory.dmp
memory/2708-410-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp
memory/2708-408-0x00007FFF3FF50000-0x00007FFF3FF7D000-memory.dmp
memory/2708-407-0x00007FFF377D0000-0x00007FFF377E6000-memory.dmp
memory/2708-402-0x00007FFF44250000-0x00007FFF4425B000-memory.dmp
memory/2708-401-0x00007FFF3FDC0000-0x00007FFF3FDD4000-memory.dmp
memory/2708-400-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp
memory/2708-399-0x00007FFF31280000-0x00007FFF31338000-memory.dmp
memory/2708-406-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp
memory/2708-393-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1799s
Max time network
1686s
Command Line
Signatures
Browser Information Discovery
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133745098245713576" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe
"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb0803cc40,0x7ffb0803cc4c,0x7ffb0803cc58
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:3
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3720,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3732 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4644,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4396 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4392,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4776 /prefetch:8
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4992,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3288,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5272,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:8
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1040,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4968 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 216.58.212.196:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | 227.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 3.180.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.212.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ogads-pa.googleapis.com | udp |
| US | 8.8.8.8:53 | apis.google.com | udp |
| GB | 142.250.200.46:443 | apis.google.com | udp |
| GB | 142.250.200.10:443 | ogads-pa.googleapis.com | udp |
| GB | 142.250.200.10:443 | ogads-pa.googleapis.com | tcp |
| US | 8.8.8.8:53 | 46.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.187.206:443 | play.google.com | udp |
| GB | 142.250.187.206:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | 206.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| GB | 142.250.178.14:443 | clients2.google.com | udp |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.178.14:443 | clients2.google.com | tcp |
| US | 8.8.8.8:53 | 14.178.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | paste.tc | udp |
| US | 104.21.46.120:443 | paste.tc | tcp |
| US | 104.21.46.120:443 | paste.tc | tcp |
| US | 8.8.8.8:53 | a.nel.cloudflare.com | udp |
| US | 8.8.8.8:53 | maxcdn.bootstrapcdn.com | udp |
| US | 104.21.46.120:443 | paste.tc | udp |
| US | 8.8.8.8:53 | cdnjs.cloudflare.com | udp |
| US | 35.190.80.1:443 | a.nel.cloudflare.com | tcp |
| US | 104.18.11.207:443 | maxcdn.bootstrapcdn.com | tcp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | tcp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | tcp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | tcp |
| US | 8.8.8.8:53 | 120.46.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.80.190.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 207.11.18.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.25.17.104.in-addr.arpa | udp |
| US | 35.190.80.1:443 | a.nel.cloudflare.com | udp |
| US | 104.18.11.207:443 | maxcdn.bootstrapcdn.com | udp |
| US | 8.8.8.8:53 | region1.google-analytics.com | udp |
| US | 216.239.34.36:443 | region1.google-analytics.com | tcp |
| US | 8.8.8.8:53 | 232.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 36.34.239.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 216.239.34.36:443 | region1.google-analytics.com | udp |
| US | 8.8.8.8:53 | www.resimupload.org | udp |
| US | 8.8.8.8:53 | api.qrserver.com | udp |
| US | 104.17.25.14:443 | cdnjs.cloudflare.com | udp |
| DE | 159.69.246.187:443 | api.qrserver.com | tcp |
| US | 104.21.66.162:443 | www.resimupload.org | tcp |
| US | 104.21.66.162:443 | www.resimupload.org | tcp |
| US | 104.21.66.162:443 | www.resimupload.org | tcp |
| US | 8.8.8.8:53 | content-autofill.googleapis.com | udp |
| GB | 142.250.178.10:443 | content-autofill.googleapis.com | tcp |
| GB | 142.250.178.10:443 | content-autofill.googleapis.com | udp |
| US | 8.8.8.8:53 | 162.66.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 187.246.69.159.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.178.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | cdn.discordapp.com | udp |
| US | 162.159.129.233:443 | cdn.discordapp.com | tcp |
| US | 162.159.129.233:443 | cdn.discordapp.com | tcp |
| US | 8.8.8.8:53 | 233.129.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 34.197.79.40.in-addr.arpa | udp |
Files
memory/780-1-0x0000000066200000-0x00000000662EB000-memory.dmp
memory/780-0-0x0000000000400000-0x00000000004CE000-memory.dmp
\??\pipe\crashpad_3092_ZQXOUCHZUUOPZLCA
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState
| MD5 | a5231f69d15dcc65f702b42b9c85ed26 |
| SHA1 | 64e0413d906a744dc618081ee28bc4684a91dda2 |
| SHA256 | 0ff7b0ef729653c0b90e6774c8412662a1b2218c71f0393a80050a40033199fa |
| SHA512 | 5461ed6eb39ac1211e802e4e113b154048eb8c563b26f1877694afa233341b671454eaee5c2e4399ba9160cf9cc530f60c3661141527870948315d05eaf35b50 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 6f8a799e14592effe23c8162f208a833 |
| SHA1 | 74ec5072ce4330ffacb7d02b0e28be9201a6d394 |
| SHA256 | e6bef29caf4089554f2568475efaa62ae7dc3f8592515a10f9097bbd1bfe2f81 |
| SHA512 | f0107f0f6e278ca7e9f88869c6227811cdfa2b8077c7371f218188120314d90ffe9bf76d44fef833064a6c3e029f8e179912ca6049f06e0bec9c68c1c01b39fd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f1910ddd8635aa2d39344a8dd7edb272 |
| SHA1 | 563e839f883c28d61fb6bc088004bb7b1e6bf1fd |
| SHA256 | 0af54bd91493d40ed1fc819a5db697fb43853a27e08e924ed7fcd6e26e29fc34 |
| SHA512 | fdc5a7c2c27ae07ad5e4542fffb60e1cfc0d8e3753dc5bb635f12aacd5da053d164460ef97bbf5f9aca89793c2774b2c54e39e9f720dc68412be4e0abdc777c6 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 957eb4565e4f9289794e354c9b7e33ed |
| SHA1 | 59ebee111ec35a931d50ff967b325696798d204f |
| SHA256 | f1e1b94e75a12f7e1affd899ad337b49d2adffce8b7dffad1b3a8794c79ca55d |
| SHA512 | bc94c36806bbd212997b1f20d3a22ecf0664756631137972be265e828546031f23d869c358ab92ebdf4dfbd9c14609c75543a46ce9c5b483d2f9f845b856954f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | fb27ef5775024e01a112f20abf155c1f |
| SHA1 | 5d8687a30406990c139157649bfbb9a70fe5c8cf |
| SHA256 | 0d64053f939efa765a045ffbc3d03b4d715e4b17ef36fd36d392fc4ba8f6cccf |
| SHA512 | b3df2260f2cd00856706b21a626aaf800875e4ef7e4ef5d1173e85955967e3735ecb0619d091fef1c27b3d2e7a28cdc6713c2a55d205dc552d8c47ba04e8f784 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 79db3a63c8d6bce9ba1474fee0dd9eb2 |
| SHA1 | a3895afa81139fb69f0e437e45b32eb2c0c53533 |
| SHA256 | 370b7073b1bf0072d3cc79969760d0b451327289b21826ccdc6275fe583cee94 |
| SHA512 | 6222189d60c2722ce836459de3fc64af15733e0535e09c8d3d28183ed180a18e79b6f34e67efa83f79372d9cde53a32cae80a21af20bb63b763d93767474cb5f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | ebaa4f395bb2d71d16fbdd48cc68bc7f |
| SHA1 | 22d594c6f317cc39863a728101bc67afdc0368a8 |
| SHA256 | d5ec43ac102c14980e5c0c116c15aea13dd0efc00e5c8d7922e539682c4268f7 |
| SHA512 | 54b888e22e83bce43ced1bd1b2ccfd1998343b49990675efc1e51b052f4ad42bb3b53afcc6b578ac2bf749e741c88bbec7fe06ee45337d9e88e191ba95480156 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8f44cc4fa74818b589fc4c4768e9604e |
| SHA1 | acca6dde8f6605cd365783ffb85ac6a95e79525c |
| SHA256 | bca37a9d166ccdfd5ead13d7c58a433ef3b975a31d45cc5a339f94c7da9e72cc |
| SHA512 | 21fdda0ecc292641c235e0c3bf24694b0f2c47f79f2c0017fed090ba1a23ceda439f0f72428076d882afcf362865589edac3e0a8f7df796ac87702385775dd3a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 7f580ca3cac1b6361fda3528e65dfb31 |
| SHA1 | 175b02395de3ca2bf5d6925aceabb5aa04a68180 |
| SHA256 | 23e37ccc9a9eb0366554a393e878057de7d81649fd6b3d58c3b6aa465e85a9a5 |
| SHA512 | 2e2283b8c9f11f81ef36a7954ee0abd4a0ff9cf0562e116dfe8ab8ee66a739621a8ad397f43fe26e19920663538817975c630aeafa298294749b541cf6ff4d85 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 11c663d10000a0a8f2dc347fddf9257e |
| SHA1 | d2a9a04b1fa3e63a39f5e1bd051d311f7fcf7cff |
| SHA256 | 0525587cd2d46803154158df2cbaaa0eed8a902ed602b7fba7bd0847583125a9 |
| SHA512 | db953dca03c91e50834ebaee550aa0ebbf5b214fbeb3d7dc91047118e9773dd228c2436497caa807845f7a82c17c211a50518f958308b6c37273944d24cad3ea |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 99f6e7b40873c780edf4c03a23876c14 |
| SHA1 | 00d876c0d64ef1bf212e37a77f817a80b58c552b |
| SHA256 | c5f72741aa96b73b315909102f92bce18a2017ecb4850db36a20441fe14d41ea |
| SHA512 | 114573da71dbc4893aed0be9d67bfb1ded801e91f1ddd127687673e52d994f25dc7ce1e08ad32388d142095322b75f033f1ba3db04dbdce2b41e1efb8d9d8715 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 3253f07448d0d10fcb0dc726c1f4c1cc |
| SHA1 | 2619762caf51b6ff59f9cfb39a2de880cdd8fcfd |
| SHA256 | 15cffd3081a8fdafae628b662391e225f450f53aa19e1a25f65d8dbd68710a3c |
| SHA512 | 40aeae8b656079600a81c89d221f13a1dca5bfe533b70f3ca0d19220bdd9d4b0983acd53b47713dd35446c052b6bef9f02daea8cab4b1668574713b9d4a07537 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f9d644b7bc08c9f242d18fe9aadef841 |
| SHA1 | 9df1bca488f91cc4c8620296cb7673a7d1d50bd8 |
| SHA256 | 72ed1320566de4abc56232c7e531af06b568f55f853c4922208db4d6f0ca4a4a |
| SHA512 | f3a6e7dab13d726ff27113278dbb9935475e685a681239f7d62f372fcffc6c470e5f0d585151c9023048cfbc8188408a72615d86fbeda97bbcd55f2905f380e2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index
| MD5 | 64b66b8c06b0b1d9f898a7992b3b29e6 |
| SHA1 | f1d27cb9e175b1a45ba273611b0d9cb883ffad8e |
| SHA256 | d57f8a452fa13d488d60ce57b1cae6c937ec1f82fbdd2ae5899cd92c8a44c1c4 |
| SHA512 | b90de3689c26c1a95ef06e290d7a54a58c54785259689487634ee89e9e50e25a8d0a87df828088cd6bc0edb7d4e2e012135a54bde45f1fb8606312cdcbdd7dc9 |
C:\Users\Admin\Downloads\x54uwn3pph.rar
| MD5 | 7c6862d02c2a378e8107088629782b3d |
| SHA1 | c9317e2facc3358910857285f8ad15d2a3532cb3 |
| SHA256 | a12269430ce9e0791ad5dd7248d2e2ae14ddd2ade4a20af3987b1256218baa51 |
| SHA512 | aed9c774c61d999815eb19efa70cb3d402cdb64babba43975cea036dcebf69880b8c089f6ed8e82fb883c902dabc5ee5843178888920cdceeb169606039b7df1 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f28c4774b3a91c7e7d2d1aac4d2477a7 |
| SHA1 | 857bf82676e0b2f90e398578f24f64d05ba9ec16 |
| SHA256 | b422165816c84a154e69473e9e6e7afc7ea606488a86280f0b53a40a9a5801ef |
| SHA512 | c6e9305525967ff96bd9b211d92e82b90ca5917397d1ee93af95f9974ed2873a6b8ac1fddcc232927933485ae22628f7f2e729ebcf8277e793010557f7ecea85 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | ab1f85e9c54caaa6aeb4829585d3950a |
| SHA1 | 76248a187d18639b2bfb3d3e83fa7ded6909c837 |
| SHA256 | ef7a6aee72deb3df8d407a0c5db636eb59142bd58cb0397299c61f5f036599ba |
| SHA512 | 6df4ce36a04e89e91e33c3ca9e84574b219fef28e941753d827b5722f40e4823b72110f62fc2166fda13cf3c0256314d15e327133f7305f2f56e80d797228cbf |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f92821facf6e2f8e8107dc567fb26971 |
| SHA1 | d6b489a2ae59028b186db719492a3e03f1bc4007 |
| SHA256 | 4fc1430efd95c25c5f8f971ef8a006ddd103f2a7b3ffdbae41b3708bf5d4997f |
| SHA512 | a7c2336b398766200b49880ee1f5c1c04b4729aad556913134e03b6303f7c45d3eb88ef912b62413cc2ef8fd4be04b97b42cfe85a69b8a7ebc8c0dffc4d1debe |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 6f9d7498c3441d8185c365489fd8457d |
| SHA1 | 467341e4020b6223f2ee0e21b5c95cd5ab0f20f2 |
| SHA256 | b1b423ae80791ba334014b8fa472a5305c793e89ea5bc8a16e6d2f3d51100ad1 |
| SHA512 | 42aaa4dd446168b2c47cf8fb120d48ccbd1c18641b8c40945b2c1ac96da7a323032e3d28af36aa3e79606291bbd69112c860fc0a5e2a6b0e4f118e41c5454cc0 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 88847997eb794ced548b4871f1c333c3 |
| SHA1 | 71c579249196d471215fc8a7afa796c11b0b2d75 |
| SHA256 | d20988fa79387431a4acd84bd6022e32bd3507a7d8598bd97b2da33dd868168e |
| SHA512 | 5092d5e5aa3a39cd382889544c44cd0e912a9b7e64f1626220a0c634150dd0340f717ccbbe9ebf384774df44a080c4f91473ecb10147f3f050737e9a3089b598 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f8c73dff75ad03c0eb915c76da13bc2a |
| SHA1 | 1c2975538d339e7d4771d879e40fdd0f854a4c18 |
| SHA256 | 09b9e79f41cc044a8311c4396516143920dc73b955854fca8c9437e925ea5717 |
| SHA512 | 5b4ca903c255dddb34d9796300705be11315ff44a92f2290e86f79b8ecfeaa6b1528315a30bc94fe2edd0d1786d2637c7ab6ea544406f8ea48c3c40f8be46fd8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 1054b62e27dada4dd234e1c37808d2f5 |
| SHA1 | c41e6a6ee5d47800b22a127e83c3d0ba5a671b16 |
| SHA256 | 7a438a1818e93054ce0f1500f2b4b8e955271ec5d33f185341e1226b5b81133e |
| SHA512 | 2324753601129142a87ec3841f74c8357f2108c68e35360106a10612a894c50816423f176ac405212d1b126695c5b74e10085ee0f6833862329507882305897b |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | ff20f713100dcd7ee608bcc5fc9f1c78 |
| SHA1 | 12ea2066fabdb2aad5567b50f76c1e2a799c646e |
| SHA256 | 4232ddfdb3fabb1d59c2e29fea7a76bac258ca9b8f8bcfff8470a84058ec7b59 |
| SHA512 | dc5c7b1a913d12b9bbd5f93f7e4e55dd5e253d4f580cd9521e502e1d7ac313dab999e9b3e341e59fc28d29ef21ccebf3dcb711d17cdda659b6dd07056d3399d3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 262720e130a47e6c95b50e69926a183e |
| SHA1 | 7e3b80bb3469b19b06ff76ce2e2921c23043adc4 |
| SHA256 | b3cf0c419021473857ee3843e79aa539be2ef2be3dc71a00d552015ee103abf1 |
| SHA512 | 1fbd472240e2f1d47d97477544720b72bf0c7422ae2145a40aac309faeb3d5e5bea4bee4ef313d9727e18740fd0e3d80434156159086b30a1ab43c3c5a163f2e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 53aa3b19a1e9ae9be65329a90351277e |
| SHA1 | 03b09b9155f93167551100056984e61a77d6137e |
| SHA256 | 7ba0df60160541d83f00dfee1453520fe9924bac9ddf54075452b94c29083d4a |
| SHA512 | 834eaaa22a3358f4dcb9cdd7662cc95055f6e88502f24cc0407bb109b30a04730a335e107f72f6dbdbe40c131ba66809acfcc779bd9ae5a5687fe94d6e782443 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 1662dbe298eb4c6ff0cb6e8a8abf71f9 |
| SHA1 | 7841eea01738119c219359696e90835d5486dcf5 |
| SHA256 | e67481c30eaf6bd3cb8e93c78a0b03934456f03cac17fc248a00feaa61c69cef |
| SHA512 | f63c6dffa81e295a2844ad2f35098543968de8c6f2e4575d610d8af6a4d475d3c1eebfa0d8322566008362f5efe4a2279beea8b2845df692e7f06852a8126f91 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | e1adb0da9e5f637236acdf19f8235479 |
| SHA1 | 8609b03753ca4f3ee3e63b968c5a00ee010baa64 |
| SHA256 | d9886ca2c6a27aa90b861a5125a66fc030c09aa70c527c4f16ab4c7923d400f3 |
| SHA512 | 8174f365c14c7a886cbe8123627fc8212e34363604e386fa76d1c7c16a622f6020a878e6c64ddcf9e0f7b12c8fec60a1615cacc4a03c3fde3f479fc746f885e6 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8a6bc50bc4baf10a31d5facb2a5df232 |
| SHA1 | 9bf30f02a8c908c7bb7ffa788b0cf3470427e876 |
| SHA256 | e2319aa7975f0cc24b8d874817fe12e8914cde459d77e198f8fa58efa41b29b5 |
| SHA512 | 30a57071de8bab7cce802fc3f457c50eef9b499a3526c8d70d02a69d68d5285213d0c017ec372bb153053458a6537d71af831cd4a2cce0a7e5d37150a6ee9d1d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 9d1a241a1dda0d6357bd3ad05d7d141b |
| SHA1 | 829eb300cfc519fbf5e369af1cd857874f0be47b |
| SHA256 | 69dd16139ea45dc50623957176f649641fe9a34d3af44275d722eeaee147b65a |
| SHA512 | a6bd78016edf64cf1310b65a62443a33211d4a43f3e62b1b67371722bfc758db0d8f707b20ae316b6d5e58305b8bbafd27cf519420fdfa42e90b055f47b53d47 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 02edae6b39f3b6f36bdf1dda1b3da76f |
| SHA1 | 6eefd9a2cef16674a49dd7c26629dfeaf1337eed |
| SHA256 | e466111787666df51ecad55df02d8d1e4f68604b91d51f6c68da55e23fc6216c |
| SHA512 | f9aea1e8c6e8d0c5d78b71edf6c0ad5375e34e336120bab7a64ab8ab25baa644a41b7ed757005a4d9a64195820a502e5d8d51543c0f791f04459f27841d31453 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 819c51d0e8d0e8d2c7d079133b1d9330 |
| SHA1 | 690fae31a7b3c7a46556d4e40ca7e5e4422f711a |
| SHA256 | 759f586c91566d21d812d35cd7249e9c4cd86e66fb94c093afee0fd18a0f8856 |
| SHA512 | 2bb1d581d1795053dec0b910e7afb80b67707a634efb93111bdcf7fe7e06ebbdae4c81f9693d10861ba7dc26fe196a09120cb4a6b7ad18fb63d7ac5aac68ffd1 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | b1ad506a20ddc57ef60ea89fa72d00de |
| SHA1 | 7c110cf7d14679e1234b37965be8aee454862500 |
| SHA256 | 953a5a1b6e7590016cb1b6386c53adffd383ccddbbd41df35d80c36e1cb51382 |
| SHA512 | ebd154e91337e7bb73b09ee92e963dd697b42c267121e6d90df78d5d463fb692fc0453f578543bd330d0e3dc45b7ce8a00086c4b87694fdaa626519956777bb7 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 3f0d2ea889ce12621a77c7bf8b836729 |
| SHA1 | 440344d666a03153032e9ea006d7874275357d5c |
| SHA256 | 14a153435ce067dc76366ef3418dbedda5539442316d1052a651cf890380ffe3 |
| SHA512 | a8997d8ea78a70a4117154a856e42c44ba971a27d119da1453d137fb1423e31e41dbdc12dfe9099b1cf52ef1c3efb5bb04031afdbe1c48cadf079a47afeaf81d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | bf02f4a6f1968a91a0072238438589ad |
| SHA1 | 70ef560942174540c3b719a602f6edb4dca90bda |
| SHA256 | cc2b05fe2c6bd2264e501ec1d15a08b10f1d405dd240705d11304e053b90f6c5 |
| SHA512 | 57f014f1a3fa1a232185df644e71064b2bdfb33f83c48a6bba58d9ecb2519bbbedaa86dfb8f5fac1f90a598d82fbf7a93822dd366a34de262263746addbe7f97 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 4eb5660c92bd802a2ef741c7ddacc440 |
| SHA1 | 8efd3ebe2a263e86133c0f31b65163bd6a186418 |
| SHA256 | a338ec4f543cfbe81f6280ae09dc57669762e829e32044fc0ced72bb63d47475 |
| SHA512 | 825f06afacbc370517243706de5233b12fefa5cf5e6217593988f735335c3ee25c5da95afec4d911a9a33f5c99dc9219e87d118a1b91287892958fff5410e829 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 24be28fe3cbe6ad0a987626cb1e5679b |
| SHA1 | 4fb4e46a1d291c2a0ed27cd6363be57506720151 |
| SHA256 | 2de0b38611f77e2df93563afa82a6479f46d21e8da11b906dce3607dd4c6011d |
| SHA512 | 25c0aedf28c5c3f4a991cfc53f41b47237548867d3d242df8a46dd65306ef66b95f3fcfbe31366e0e1ead47b620908049208735fe0ba551641dae5ae15439b7d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | bd71080928a73b9c8392ac6eac3ab9c8 |
| SHA1 | fe22c66c1a01dbd8911b5193fbd21c3b3f91d908 |
| SHA256 | 0659202c47c97a76c5c5b9a46371ebb4634c9bab42f82615c5b3782814229763 |
| SHA512 | 77734f5b34f7acb7701318bb2aa34d9a68a0eff9709b10ea370188f0db158abb6dd8eb6a2a297b8f77fdb6907990cc686464a87143cda974182bb35413967c3e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | cab6c3a6723bcf8403cf533c48f90e5a |
| SHA1 | 552e83065728c8b854e0452063870b3a1148b9b6 |
| SHA256 | be77f232e3e2f7a4c1c9bd704378a79ddbce936c28e3a85f00733a9f6c39712d |
| SHA512 | 40dd3e3747d19d77676f6e773cd4641346cccdf4aef34af6093ae84b9433084abfab54de6e81e350a00fbd3ab598fc1425557297be605329202309cccdf02693 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 112e73452178a1f5872a2e2c6ba02bb4 |
| SHA1 | e26ceee32f12f7fe63471ae118f61a65a5304be6 |
| SHA256 | 143b993ac3f493ed93825a1fb7d4ba2ed220255188489636c2ab8c98ccd600f3 |
| SHA512 | 260a43aa1d801b09eda268124d4b5327a97d22d2178f5dcc7c31848fecef48ac8b2f9aab9d2922e96421ae5006baa1d10186d504c1ff29ec88ba6a68d5d3c61b |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 2e19f7e705cc5b0339a2b5d6e25946b2 |
| SHA1 | 8e0301a93750f0c687c49a658baa389ef7b4db2e |
| SHA256 | d4722be60954af8eb3c4f5544db85bc01f3264f8ddb6732839790d9fe369c957 |
| SHA512 | 60a16a1d479470ebe6df9dbac7172a98974308a1086dbb1f02ecf71f25d620c745d3b13a4a687a4205da592014650f0571784b1535142cf3d9cacada0dc76466 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 9453d22d8fcfa6304980f10d6965c0bf |
| SHA1 | eb25968c3f359866e7687709564f34e4cd31da78 |
| SHA256 | 6c51e22725605dd64f081ae7802e1593f5df978990aab90b9f47c0ac10d49874 |
| SHA512 | 10b393334f8b3692324dfb25a7c16e77e3e07d556ff636428a9462f0e3ded446f313ee9733fe21903f28d471df2229eca474c64728b4eed85f9589e7ca480759 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 7c6001c85ee4586ef209265c506b1faf |
| SHA1 | 0418c6636791f1e1921f3af85e0e1fafec244b43 |
| SHA256 | 31f108d03df3035aed08004e7131cf27cc748fcccc237f34fa81d44a5891cac1 |
| SHA512 | 48429252b91f62d22fb98e6f8f198f86edd7599958ebb1d5c5449ad31e642ce99996666d8dfdd5579cc7eed112c1e372c4b0760eb07e359f28ca911c093dc450 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 256038004b637b753bb1e50648a0bc65 |
| SHA1 | b06f43162d72465f799df7d3fd30a55319f73bab |
| SHA256 | fd52bd21320ef635001560abdbb320e6bafcab44763a7f636e663a3e3cb458d6 |
| SHA512 | ba210af850de571f654d7d0a2337908ece0321fc31557cdc7f983064c1f90648769abd0d3c4c28d4420b611718f325fa5439e3cf81b42b059cfee9a0a5dd8c86 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | e33bb6493daa19fbfc99939b8bcbeb43 |
| SHA1 | dacce22795a133567c6f879125318e44b9eef336 |
| SHA256 | 3e671b2ae87d0228599d6847125114e7aa946a4dbf6dfeb29bd1cac302c11171 |
| SHA512 | 34afd33206066da8917fe42be06094c9571cbfe0b732ec1d8e9b6e99f55aa0facd28aa4af4f66ed01aa902adc7aae93cfa1e795af11d0d5a775ebf27cd20b015 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 784b43c8283b4c3757cd5712bbcd5b92 |
| SHA1 | e24539dc54f96ad2783550ef1b1c86c1782b29d2 |
| SHA256 | 22c22beeeba8fe12405f1e0dd0261129dd30f6d882c48e13be505a7a9bc2716c |
| SHA512 | 3d9ff26d3770ba30a1b62ab91b3be638ccd88383fbc117b4251697240af2a99053e245b4e2d5fb84b00e6885b735fe2304df64435adf4a605693fe153e1f9315 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 6cd4bf9133d5fc6004c7212cf7937ccb |
| SHA1 | 65563fae244108faa9348ac9a4bf16e24445c2c4 |
| SHA256 | 59d824a45f8e730d355204d4ff8ee623c00c686bec314fa56e0758687bdabcf3 |
| SHA512 | 6b90fafe315995842b591b74b33bc151c40b614a4591f63b894503496b9c3f763e2cde852f8168c8200aee92bd2b7e3a9ed8d4450364d8bc1654fecf85f5d475 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 2b4ec2eac2960c9fd5929bada70b1a51 |
| SHA1 | f124c54ac8b8c0a884413f43b7d8c690a0c474d9 |
| SHA256 | 2f44ac1cd58a8caae225779c6cbb17daa0411d0e4f92bc56bfa59c62f1b62fe8 |
| SHA512 | af2186bda3687edf9bbc9b48ea7ac3aec30e43a413e00218274021a6167742928ff2f474a8572e9cd3db77f9c1525348c019e3d946099541e2b9d35edf61dc83 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 5594946899de8c268c05db90ba8dc9e6 |
| SHA1 | 317fe1a28e1b29c7a1f4a7c0c8237da1a09fe3ab |
| SHA256 | 771646c068cb172531273a9d87c01063050c8f7b91ae4a621282863732043ace |
| SHA512 | 7b34ce4812092b4db580fd6991a48979ea4598cf2d39fa46815fe7c51df5946639494c7c8681fc9b69903c94c6ca2793ca43080c3e8ce0a4fbc28405bf85cd28 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 0a24e8c16d014a152b35ea13ef53d35c |
| SHA1 | 3734d0deb9af5277dcc6535c69e667ac83f0561f |
| SHA256 | d27fd6497c5b742db759f91e7f5650fa219fe2cfb982422c60d9de7b7be15149 |
| SHA512 | dd4ce201069e78a12db731de8290111707d9a5efeea6c355ed558f68750e326a5abc36ec556db344f5ecd4e7f9ba4924f638442b9e4d694c644780b6bd3a32b8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 4ef50d5138eef81597960ab407ea7b9b |
| SHA1 | cc7cf8efc0a89754a29667a24c1531946791d715 |
| SHA256 | e019d85cd83d1f5960d8d8ed759e97129ffc8dca2f6991cde6a321935540062c |
| SHA512 | e2b003af7eb69332b804c994587235db3504df1ff5ca00cbc3eb306e9fd061158c0b42a420773927cf301d54901e7e81aef0fb1455c645c4b7c81ca31ec1a0cc |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 46cc887ce20321a16c0525c8cf832e00 |
| SHA1 | 9d463466fa6011fe1bd1d6a669c09620908b7f4b |
| SHA256 | 83e64429f2841f97457155f9fd74d15849b62c4496084276a971476bdbe4d542 |
| SHA512 | 3e6b01beddf7bfcddad3a0bdb74bb9f6fa682f577e1d3f6232787f281c61cb0ced928376ed23c16725f35351e154ad8cbe80a7d8e7d3c874274b7a2bef52ee77 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f09cfe54587b2f9a990ba338cbc4f1bf |
| SHA1 | 7053a5897b1741f79dfc0a7548fcd7ae9c8cea63 |
| SHA256 | a7c7d90624bb440d1db1ffce30f6b48eac6db3ddbf1edb7639f91fd7347f7833 |
| SHA512 | a14406c5abaaa30b716dbda56acc4a017d4a04564c118e0237ce429228df43df5d327f7fc9960246bdfaad43f94eda5a38f9909e8b602be474afca607b5d4636 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 5dad40fd4da14c2c023161c77a71a9a0 |
| SHA1 | c2cc78c32a995f0a32ad23dba3e0c760e96052fc |
| SHA256 | f6351f44a7d46f4d049a16af5dd58c67b60cd2f7179c07d5f7d634b76b9cd4cd |
| SHA512 | e65b76cbaa76dbc0e63dad68a34a64d8f89bd0ef080fcd4e9226b08d2cbfcf67304c533300e0040fd75296d25890b88dfb1c36120e41b4cc005c5a11dab46004 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8bce4d9c9161f8b92634b2d960dc898d |
| SHA1 | b655d23f8ad277876dc0ac72504f3f6d778208ee |
| SHA256 | 04fb33bbc54b4e323688af1f55dedd8a8875295e938432d9b320f995d475f1fd |
| SHA512 | 5057367b828786d09754eea6bee8fcce149b2403878d90c49ba91f8807d9d775e7ec82c5cfaf3b922e10ca5aa4901757938badeda4007cc82b8a2e1eb14a0dea |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | cddce490c9e09e8235a7c13c20f880bd |
| SHA1 | afec03124bfab1da6bc5ab3635559651c00a048e |
| SHA256 | ba9f14199a0d7e0e0501dcef3f0169d2be89dbcd048cfaad0cdcab0dcac23de3 |
| SHA512 | a623ce1ddcd00534e65726c7d6aa98121558bcaedbf3ac5021abe100f61d977ac16f13ab2ad401faf17f69ea5bd2f7459d1cee38dc9174db8236bc0cb2c0ecb4 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f6846609d56e22fe2a4d6c630ccfd248 |
| SHA1 | d7ea2c6b8a317c6cba9c477f6c2115fc19fff3fc |
| SHA256 | 450b364fd0e9225e1c83f57a3e9cb8fce013537c660d50db83ab7a75821a101d |
| SHA512 | 5b115cb5453cea8fed4444b606bc47c2874c703a946fbcbcfc5c748095be61f9dc6c83c938ed1f412c896735f25b91fd3a3b3e0e6ecf1c79efeb7cfbed8e98df |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 4ff66c67503ca7ab6cb85c8441a725fc |
| SHA1 | 208bb25afbe1e109f0b401b46a39860153b89733 |
| SHA256 | 5543ce716704165d6067589f6a49ac7df5e62c95b41bb4334a6212c56f539bc3 |
| SHA512 | 690bccfa9b0fac63289b9f0ca850a880d1be415ed141bcb354f2687fa0443e848a0ae78d164536c8fba8ca6ab337efebb0c343383541a91e67d93dbea6837a35 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 54a3aa1fee0742a1a454c20d5561e245 |
| SHA1 | 4f93f875d6790ff7f1093d9ebfc006720d1d3fa8 |
| SHA256 | 865fa04d2f6f51b1500829c4634cca415c60d7cf0471590c196ed260094eaadb |
| SHA512 | 5c59a6aab6d4a143ca7b4078bbf8e4532ce1ff70890899d62172d1141214aa4cc43fdd2f64eb0a3cc3e0a1ef1f85047b95fe877439feb1e8fd83b23016ea7846 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | c0f78d9e571f955c7f62f167cead4d9c |
| SHA1 | b17a97458bb033de45507bb0ca9676ef36fc3709 |
| SHA256 | e562933216341eef53f03ab6c02149a4c52df0e7bcdd160236b9c8c113f98c3b |
| SHA512 | ed7ce1b695751c83e109d862c63c5347fdce918d47940ed102ce9493d6fcb586d89870a157e50d3a7ee5dd393901a4d4fc49923baf3f16a1ed990aeeab1cc5aa |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 319bfd183926939aa40738a4d699aca3 |
| SHA1 | 13c71ce52ac9dd50b8e591c6dca1e064e5fcaf33 |
| SHA256 | 99406aa98223e11f716092e7603b1a76bd1e031086aa457ba0d263df755434c4 |
| SHA512 | 1d5dc7c68377eae5993648c979bf714b20b56f810366c17990d89d3fc2b0c2d28dd896abad57ee6d1f7e7328160775aee9d69db3c24eac5a5c715664d61d074f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\48ed2c31-c779-4714-a8f3-12027cd31035.tmp
| MD5 | f789a60d03f13d234231bdd6406026d8 |
| SHA1 | 1cc98c6c5842b1d372645e74a88eeb37b67416b7 |
| SHA256 | 13f6b55612e0afa28da2acd1af6d2d70f2433b6626551b81fdcc56a3affe4363 |
| SHA512 | f4aff7b0b38025e8be569d632ad771820d26e4e7581bece0388a4dccba274267112ad106b0c0b9f217537128ce450d98f39501c440550e465831fafb09cb6741 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 7fe59851b67adbe55ba236f72763979a |
| SHA1 | e44ba3129d39de98df4ecfa8ea037ab40e2d7235 |
| SHA256 | 6feac6676e74e2008657f3bfb59b96cea10fad00585530001d2fbfe19d193167 |
| SHA512 | c75308f96848d159e39658ee34e933596c6fb91f644ec93f8c345e28e89d0d5b84b267f3a30d5089d80a1a0931c4d7d420e04738cc8200dabaf8d055cd928aed |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 03c9b50f9c9b95c05358fdce3556471a |
| SHA1 | f8f2eb82cc8cf376dd1a249fe35e4db28b2f8194 |
| SHA256 | 3864308b8065f4d16d4979d38705301afeeefa78324ce20d39860442cffd21bf |
| SHA512 | 1be46340d0f993ba04bbe6b822c7a306883405082ebef7a3854d153fe9e0af35a9bb967e1268265b2132d820c8bb4297f148318371212c11ddc81d2d780059a8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 8f5da65be80b39dafe7f47d9a9fe5a81 |
| SHA1 | 76219d1c94ddf1b49fdcc304bab1c76b0dde50fd |
| SHA256 | a596fa0461ba49eab8388cadc7959f311c9307e9946817d3c8db87fca14e2fb9 |
| SHA512 | 371b8749c235ed793a793b29da919bbf71996c38ac7a4ed18dfb0b9381a052672abaf16fe895a0c9db04d133dfffc99815e3fa1fa9f0ff31a9a502f89114f6f3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 01a8d39c24757ef9abf3373240a77b19 |
| SHA1 | bc4594e3de96f33f60058c74a0fcf1659658cb74 |
| SHA256 | f013e3400db1d5563ac8b526c72412f28e778aea1896b9f90ddb037782df7fcd |
| SHA512 | f1f56404e747322fa8a0cfafaa2763433bb27bd36188e9730d7c418d599dee44e166422b3dd6247a46aabfef1d8803d2efbdf223007d75bfe2576e6a045d53fe |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 12f477b3f350cefd68e0b14326abb843 |
| SHA1 | bdac7031f2c5389b42586198b8de30a52ae961f3 |
| SHA256 | 672fbd27d71850cdcd8cfb49b9965d016d9fff386872b484e67530f7fd3a29ca |
| SHA512 | 6d08c94d3b164ce520ad79928852a703f005a7b15f0f70ceab0ce169601ffeaa041215b0c3a74a7f4b7e10d759a2e7c8c3881e3daeb26310d71ab8cd29915ece |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | bf15f6267e2ed1c67c721482ed6818f0 |
| SHA1 | 42d348f6f9831cc8567e2ef86d4a6dc632b0c6d9 |
| SHA256 | 14519e14a86d5a52aaf4ad82a0de73fa9b7c26f19248ec582a10bcf1d931ccfa |
| SHA512 | 2a6f2c916c79011cb43452852b83bae57978ee9f876d2f04efd9be369a314e5e5d60eda83ebf2098f91fc1ed20163e4ba0ee23dd244831c9b7a23dbf376b0b7e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\375cf73f-2663-4837-9234-60f6d26e4f27.tmp
| MD5 | 42b78e6f29153841bad0e5a0b9c105b0 |
| SHA1 | e3214c8cc46ba591136ea98539a00a50853efd34 |
| SHA256 | 261c51f899f8293b7b11674d269506d8c0596707ce9c1473e8938f3e3e3a4b5a |
| SHA512 | 115bdb48786a70b23b6241c4601b30d190654c5e5709a58730a5f98bfc42ee67e494458d3e9f4e980bb33c99c2d42814fa3940ecd904e47bcd105caa9a21e375 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | addcaea7e368626b15c7e5679860d9a2 |
| SHA1 | 606afc709a1fa9c6378934916f45ff13a305523d |
| SHA256 | 36e20e3e9cca53ade6d0655a6acc0c7f3be2924608d17cfd1139a0b2f02442b6 |
| SHA512 | fb52c05b0968c8c4f7ed9d3fb156108b4becb30a2894279e4a051d006a176154221a1978d3310fea54e9b7e83e088b5bfd841eb325a99be7aa40ed132bbabee8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 02b7131733032123760b077005b76fba |
| SHA1 | 0d55cfc622a8be8febc051f9ca5ca0748c4ccef1 |
| SHA256 | 2c1211e203d8f22c4bc7f6ab5224dabb4cdaa4586d0f7dbd56dbf58a17daa43d |
| SHA512 | b34eddf1147cdaed6bb80dc20d9d506df35445b99f2107b564b37c1a0f8698e5572e23a5d988819c7ed06fc2141634f852354c01f5657cc0d6c275ca65982c4a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 041be6815bd1d3f3cee5a5e5d2f701f1 |
| SHA1 | 316066531e62d1e3b6563ce56604ab79bd5ad299 |
| SHA256 | 6402bd09561baf5340e785ddbe7948cd5adaef45b10ec1293c4d72613d5026dd |
| SHA512 | d45e5cc9c6faead9b1164f58f0cf8f2c384b3ff955fc85847560d07ca5c376bc63a09040388f148693e68a1ffa94422f0f00bff5f3942fc9a4b9a4730f4eb2c2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | c97fdd0f1a034f161a5bed99889e3958 |
| SHA1 | 64cac650cff5e045d1acbde824089e3b28fe6dfe |
| SHA256 | ac6d0178c7813bfe9d46d38d3c9f2d36962900e6acb8f8328a6f7cce6ab32ca0 |
| SHA512 | ac48172b265333ec4e1835dbe1970e68170e901cbd38c621aef42ed271f2a553b2c923f1639585ef81ebf0aa5f41deeda2b64095bcbd239fc07a605ccd48512a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 000b7dd356fda7ded222b7994590775a |
| SHA1 | 9af3f370ef5a1291a4949222a749e2d43a9ab912 |
| SHA256 | a76a67525752093ed2a52a7473c5d71b4fb703aaec1a424fd2fa213d3e2b9962 |
| SHA512 | 0b6780ffbf57ba462b0c45b389664a8b92dee911a51848a4e94ebf42b577f4108ba6f40f513a23240cd810a4ec4a165e9e761b9f87cbd2c6e6850cac7015bb2f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 60f965f60183635405ba46b61a19a694 |
| SHA1 | d842acab1acf5015232e87fef9132e3ba2fbba5e |
| SHA256 | 595977b9bbadcf296db611e5c03fd2b236fe738f3ccc2b651ee9870db60369c6 |
| SHA512 | 787a3668acbde645fa0d0c94fd6f9b14c6409dadec08f8c347ea3a1a56718c5a5232c945d7e95952bb566520461c359f4456ddd54e9b510697ca07d8d9655f3c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 1c5b45603147c6246803726370cd08f8 |
| SHA1 | 6369daee3a9995e8983c7f0e316522b14e71c202 |
| SHA256 | 3cb1538ac082d712de667feb9ee07efaa3d62d7519fa882341750ac5dec166dd |
| SHA512 | 8117431de9410ce7dde75421da6a5e54994642b6b44b954549d08dcdca91fe7dc209925c93e22cff69fd6b9f748b00e77d1a014acf3841ae3a1b54393b83a9a3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | a9f8dbd55eb5716843b697a2457e547d |
| SHA1 | 7fbfd2dbc6ac15a18870288636b41213eae6522c |
| SHA256 | 9095efe0f5c810dd431294018102a0f37f3b3e5f80d0c338bb28a446700b8980 |
| SHA512 | eee81d3f60b0d6cc4bdd1b8308df92b64c399c107ebc35474314e6869ffca150e03946b3b5ea0a47ca9641cdfe4111cab6fa89bca73cad36203f63994eb5023d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 819fc28991cb08a7789fc317ede31226 |
| SHA1 | b2c9a8111545fe9aec91cc043529887fae1ffdcd |
| SHA256 | 95b7987f7c28787d91c8d4b5ef29dac6663355dd7ce486ec306e41bc1a979209 |
| SHA512 | d2deb9df7df83ff85fa9cf94f0d7a287df89c9cd25f63ccf2684602a020b0edafe8a1bed41d90327156aa80b02a7afa736295ebc9ff7e055c4ac24ccea3d9f5f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 4aa807141d2e50013ef73e1f2e039f42 |
| SHA1 | 0e6dddb917480750a288b8d2976175c61a85d6a4 |
| SHA256 | 6cd76afa1c7d3710ed370364f6892425e0e513fea35f1ba4cc43ac350ef1b623 |
| SHA512 | 00afc0f44bdd511d1904abd9d4489d72ad269099acd8767cbd1850e978d715ac352195691773892cfb5f9ad50d425e3e6565e55222cbaa1546c55e6902e9e8c3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | aa3a35b5ce3746b8ab802991ecb1caab |
| SHA1 | b38636b3153cc3e68b3095a73a9708feafe0ceca |
| SHA256 | 531f4985eefaaf049ea40a6fa9b9d018f7fb51fbdeedf2172a7429df60e74466 |
| SHA512 | a0b4b19a4fc8b50da6c85530dc74510b03f405c06a420b3222ab7f13b4746e22d00736704eff9563a3dc8d77eca8aca3fc283c15fa86ce0845fceae1bdd6da4a |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | d410aae1b67a9619e9f4ada13b4287b3 |
| SHA1 | c69308e49a68aa65a55c078b261ffdbff5139d11 |
| SHA256 | 090398f1c88f6213ba102d19b112c0e45b1744a6bd4f572fea1dd1d6b01d42af |
| SHA512 | 9837dc1bada9667f57ff93cfcb2d2ad66c3e2e41a76739d0b9a115385708ad4d872faf9fbf59bd6bacf7c72d74bf2313473391f9276dc5813f3cd282c4b49849 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 552a4813ed2db59886729527fa2cdcef |
| SHA1 | 118dd4bdd53201c0796ee74e2395a8501e27faff |
| SHA256 | 7e4fc696de654fd261316cb74d734bd8c869ce86f2defad8a5f764f10736b981 |
| SHA512 | e4bf24a00b894c0122db3e17f1747c7ce9df1e5e4478d133cfcb2f71edcab4e207cd8cb9757f6220798012eb4617d4cafeedf8077437cba8dfc764e00061e3cf |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | a70a4c3d11a55b19f9dbfb21010456fc |
| SHA1 | 6a79d0391190bfe3db9b9dce469e8453e56cda9c |
| SHA256 | 4b4df3613de2ccd5aa78b66a35bbae5361ee31940dd993c90d12958bc1a23ed4 |
| SHA512 | b481b8d879396be498a274b879dd5b668d4ebf5f4c9c58b2df2b9c44798899b2d209a30afa2ee9e9a427b2a9174973ed6491f15fedd55eed203bb49ea7506094 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f06448f98c1dd254eb2952f04061f9e1 |
| SHA1 | 109dd60732c5e1a119206ac7b4e6feda9539afd0 |
| SHA256 | f9819ab9a3fdbe526d7c2445a044cff5ef1e359f103e5af4b18d17b02252891a |
| SHA512 | 4e5316c998ed6d03ffdce5594feb55479de4528e6d45b41f11b3a82ffb4fe9a53d7e0a3d073ddbbcfd607ceb75fc9b2a4a8248512c1410d6b0bd2ac8da48ae0c |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | e602b53c8364ceb47f3b33b1c81a8a3b |
| SHA1 | b0604223a3485e4ef8e3de7d7dead68870e9f7c2 |
| SHA256 | c709dd5ec80c715d5d9eba1a5d167c11db5aaa4c50bfcd706b2675427386d6e0 |
| SHA512 | 9b6b95a420b6f4c896f511c1c58da2daa13b09e5e34432e26cb964a200c0744e225fa6442d6fb55d3b70337ad6d6c126b47c7bf17981146ca7c5764b5d40ae01 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | c4a142c2621bde1e80c20768c3a3e1d2 |
| SHA1 | 799fe3ed9e156e7ad56d22e223a259da3b53df0b |
| SHA256 | 831ba45e10f3682781c915afe737d5c7c247187d21753c676dac625548c8d085 |
| SHA512 | 4d4ae92030c8904ea6de013e48636a71f612eea0ce76017b559ca7aafe040d87a4d38d7d14f16725633ea09968dc877674ea82947e3847a32553ae184b339410 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | f589a9bf4ffa918199729e2d15be9360 |
| SHA1 | a90749b747336de5f16ca56c139141039cad073b |
| SHA256 | bec10a7ba8e83d29cd76354e5e5f6eb13309146cdfbadd4e780266ec9cd54d2a |
| SHA512 | 86e5eb43d437655aae74a51383795a7d4afcd1c740b8f05ec174a39f3144ee607471de5af1526f535fbcaf3964371787e68674a09f221c5fe4fa146ca0b2f14d |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | a76b2d29861c7306428d25a4d938f57d |
| SHA1 | efb3a4f093952683c408e0bf460d29a49ff2eba8 |
| SHA256 | e97bc223b2b3b949470d068e839ce14f84f6749406bb2c483c3d6a4480e4fa92 |
| SHA512 | cd2411d2a077a789e9c4433238300bf9c1391a1795e7c5442db0bd187fb33dfa19825da6cae03e5bd463b5bad733e56b2f1554ebe9d57afbfe80ae4683905ce8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 7a6f5e353a33ff76e21c336565467069 |
| SHA1 | 8873bed0f25c16c11b625b305a4e8f643cb771d1 |
| SHA256 | 09907fb051a4c6c6b1f13110fc7a3b60a48991088a48ba7915396c39d7b3a2d2 |
| SHA512 | 001ef5afd9dedd45f562d5d264edd177772615e4dc38dcf078f02d318ff5eed483fc8069ffd75ac1ca5de5b5317cd008b190e24a15e2c03f2346d1e996416628 |
Analysis: behavioral6
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1694s
Max time network
1153s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2792 wrote to memory of 4332 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2792 wrote to memory of 4332 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2792 wrote to memory of 4332 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libgmp-3.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libgmp-3.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4332 -ip 4332
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 600
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 72.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 138.201.86.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 224.162.46.104.in-addr.arpa | udp |
Files
memory/4332-0-0x0000000068C80000-0x0000000068CEF000-memory.dmp
Analysis: behavioral8
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1364s
Max time network
1153s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3304 wrote to memory of 4884 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3304 wrote to memory of 4884 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3304 wrote to memory of 4884 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libisl-10.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libisl-10.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4884 -ip 4884
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 608
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.79.70.13.in-addr.arpa | udp |
Files
memory/4884-1-0x0000000068C80000-0x0000000068CEF000-memory.dmp
memory/4884-0-0x000000006A780000-0x000000006A86A000-memory.dmp
Analysis: behavioral15
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1371s
Max time network
1161s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-log.o
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.79.70.13.in-addr.arpa | udp |
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1359s
Max time network
1146s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4800 wrote to memory of 632 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4800 wrote to memory of 632 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4800 wrote to memory of 632 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpc-2.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpc-2.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 632 -ip 632
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 604
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 66.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 5.173.189.20.in-addr.arpa | udp |
Files
memory/632-2-0x0000000068C80000-0x0000000068CEF000-memory.dmp
memory/632-1-0x000000006FE80000-0x000000006FED7000-memory.dmp
memory/632-0-0x0000000065600000-0x0000000065619000-memory.dmp
Analysis: behavioral10
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1373s
Max time network
1155s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 888 wrote to memory of 2344 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 888 wrote to memory of 2344 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 888 wrote to memory of 2344 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpfr-1.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpfr-1.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2344 -ip 2344
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 604
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.179.89.13.in-addr.arpa | udp |
Files
memory/2344-1-0x0000000068C80000-0x0000000068CEF000-memory.dmp
memory/2344-0-0x000000006FE80000-0x000000006FED7000-memory.dmp
Analysis: behavioral11
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1366s
Max time network
1158s
Command Line
Signatures
Command and Scripting Interpreter: JavaScript
Processes
C:\Windows\system32\wscript.exe
wscript.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\include\winapi\mshtml.js
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.27.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 55.36.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 101.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.179.89.13.in-addr.arpa | udp |
Files
Analysis: behavioral14
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1709s
Max time network
1147s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-exe.o
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 205.47.74.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 206.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 66.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.201.86.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.173.189.20.in-addr.arpa | udp |
Files
Analysis: behavioral16
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1756s
Max time network
1142s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\libtcc.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.179.89.13.in-addr.arpa | udp |
Files
memory/3248-0-0x00007FF9EB250000-0x00007FF9EB2B5000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2024-10-27 13:36
Reported
2024-10-27 14:07
Platform
win10v2004-20241007-en
Max time kernel
1790s
Max time network
1139s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe
"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 150.171.28.10:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 79.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.209.201.84.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.99.105.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.27.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 10.27.171.150.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.179.89.13.in-addr.arpa | udp |
Files
memory/2952-0-0x0000000000401000-0x0000000000DAC000-memory.dmp
memory/2952-5-0x0000000065600000-0x0000000065619000-memory.dmp
memory/2952-6-0x000000006A780000-0x000000006A86A000-memory.dmp
memory/2952-1-0x0000000000400000-0x0000000001149000-memory.dmp
memory/2952-7-0x000000006FE80000-0x000000006FED7000-memory.dmp
memory/2952-4-0x0000000068C80000-0x0000000068CEF000-memory.dmp
memory/2952-3-0x0000000066200000-0x00000000662EB000-memory.dmp
memory/2952-2-0x0000000070F00000-0x0000000070F24000-memory.dmp