Malware Analysis Report

2025-01-22 08:29

Sample ID 241027-qwgt9ayfmq
Target x54uwn3pph.rar
SHA256 a12269430ce9e0791ad5dd7248d2e2ae14ddd2ade4a20af3987b1256218baa51
Tags
discovery defense_evasion evasion execution persistence privilege_escalation pyinstaller spyware stealer upx
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

a12269430ce9e0791ad5dd7248d2e2ae14ddd2ade4a20af3987b1256218baa51

Threat Level: Likely malicious

The file x54uwn3pph.rar was found to be: Likely malicious.

Malicious Activity Summary

discovery defense_evasion evasion execution persistence privilege_escalation pyinstaller spyware stealer upx

Stops running service(s)

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Obfuscated Files or Information: Command Obfuscation

Looks up external IP address via web service

UPX packed file

Launches sc.exe

System Network Configuration Discovery: Wi-Fi Discovery

Event Triggered Execution: Netsh Helper DLL

Browser Information Discovery

Enumerates physical storage devices

Program crash

Unsigned PE

System Location Discovery: System Language Discovery

Detects Pyinstaller

Command and Scripting Interpreter: JavaScript

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

Modifies data under HKEY_USERS

Suspicious use of SetWindowsHookEx

Modifies registry key

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-27 13:36

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1750s

Max time network

1171s

Command Line

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\tcc.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\tcc.exe

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\tcc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 73.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 105.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 67.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

memory/1044-1-0x00007FFDC4AB0000-0x00007FFDC4B15000-memory.dmp

memory/1044-0-0x00007FF6A7280000-0x00007FF6A7296000-memory.dmp

Analysis: behavioral18

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1668s

Max time network

1160s

Command Line

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\x86_64-win32-tcc.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\x86_64-win32-tcc.exe

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\x86_64-win32-tcc.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 107.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 2.173.189.20.in-addr.arpa udp

Files

memory/1400-0-0x00007FF6F76A0000-0x00007FF6F770A000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1363s

Max time network

1154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\libiconv-2.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 984 wrote to memory of 1364 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 984 wrote to memory of 1364 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 984 wrote to memory of 1364 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\libiconv-2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\libiconv-2.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1364 -ip 1364

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 576

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 91.16.208.104.in-addr.arpa udp

Files

memory/1364-0-0x0000000066200000-0x00000000662EB000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1790s

Max time network

1154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3316 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe C:\Windows\SysWOW64\cmd.exe
PID 3316 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe C:\Windows\SysWOW64\cmd.exe
PID 3316 wrote to memory of 2180 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe C:\Windows\SysWOW64\cmd.exe
PID 2180 wrote to memory of 3196 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe
PID 2180 wrote to memory of 3196 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe
PID 2180 wrote to memory of 3196 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe
PID 3196 wrote to memory of 3616 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe
PID 3196 wrote to memory of 3616 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe
PID 3196 wrote to memory of 3616 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe

Processes

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\windres.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc" -E -xc -DRC_INVOKED -

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc -E -xc -DRC_INVOKED -

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe

"C:/Users/Admin/AppData/Local/Temp/x54uwn3pph/Compilers/MinGW64/bin/../libexec/gcc/x86_64-w64-mingw32/4.9.2/cc1.exe" "-E" "-quiet" "-iprefix" "C:/Users/Admin/AppData/Local/Temp/x54uwn3pph/Compilers/MinGW64/bin/../lib/gcc/x86_64-w64-mingw32/4.9.2/" "-D_REENTRANT" "-D" "RC_INVOKED" "-" "-mtune=generic" "-march=x86-64"

Network

Country Destination Domain Proto
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

memory/3616-0-0x0000000000401000-0x0000000000DAC000-memory.dmp

memory/3196-3-0x0000000066200000-0x00000000662EB000-memory.dmp

memory/3196-2-0x0000000000400000-0x00000000004CE000-memory.dmp

memory/3316-1-0x0000000000400000-0x0000000000502000-memory.dmp

memory/3616-4-0x0000000000400000-0x0000000001149000-memory.dmp

memory/3616-10-0x0000000065600000-0x0000000065619000-memory.dmp

memory/3616-9-0x000000006FE80000-0x000000006FED7000-memory.dmp

memory/3616-8-0x000000006A780000-0x000000006A86A000-memory.dmp

memory/3616-7-0x0000000066200000-0x00000000662EB000-memory.dmp

memory/3616-6-0x0000000070F00000-0x0000000070F24000-memory.dmp

memory/3616-5-0x0000000068C80000-0x0000000068CEF000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1692s

Max time network

1152s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libcloog-isl-3.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 764 wrote to memory of 4028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 764 wrote to memory of 4028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 764 wrote to memory of 4028 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libcloog-isl-3.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libcloog-isl-3.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4028 -ip 4028

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 604

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 107.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 200.79.70.13.in-addr.arpa udp

Files

memory/4028-0-0x0000000070F00000-0x0000000070F24000-memory.dmp

memory/4028-2-0x000000006A780000-0x000000006A86A000-memory.dmp

memory/4028-1-0x0000000068C80000-0x0000000068CEF000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1366s

Max time network

1154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libiconv-2.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3080 wrote to memory of 1004 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3080 wrote to memory of 1004 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3080 wrote to memory of 1004 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libiconv-2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libiconv-2.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1004 -ip 1004

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 600

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 72.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 99.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 95.16.208.104.in-addr.arpa udp

Files

memory/1004-0-0x0000000066200000-0x00000000662EB000-memory.dmp

Analysis: behavioral12

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1359s

Max time network

1150s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bcheck.o

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bcheck.o

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 73.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 208.143.182.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral13

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1337s

Max time network

1161s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-dll.o

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-dll.o

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 105.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 27.73.42.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral19

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1799s

Max time network

1120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe"

Signatures

Stops running service(s)

evasion execution

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\empyrean = "C:\\Users\\Admin\\AppData\\Roaming\\empyrean\\run.bat" C:\Windows\system32\reg.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A
N/A ipapi.co N/A N/A

Obfuscated Files or Information: Command Obfuscation

defense_evasion

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\sc.exe N/A
N/A N/A C:\Windows\SysWOW64\sc.exe N/A

Browser Information Discovery

discovery

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\sc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\sc.exe N/A

System Network Configuration Discovery: Wi-Fi Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\system32\reg.exe N/A
N/A N/A C:\Windows\system32\reg.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\main.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1872 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1872 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1872 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1872 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe
PID 1872 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe
PID 1872 wrote to memory of 1724 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe
PID 1724 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe C:\Windows\SysWOW64\cmd.exe
PID 1872 wrote to memory of 4020 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Users\Admin\AppData\Local\Temp\main.exe
PID 1872 wrote to memory of 4020 N/A C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe C:\Users\Admin\AppData\Local\Temp\main.exe
PID 2840 wrote to memory of 4752 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2840 wrote to memory of 4752 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 2840 wrote to memory of 4752 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\sc.exe
PID 4020 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Users\Admin\AppData\Local\Temp\main.exe
PID 4020 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Users\Admin\AppData\Local\Temp\main.exe
PID 1724 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe C:\Windows\SysWOW64\cmd.exe
PID 1724 wrote to memory of 4568 N/A C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe C:\Windows\SysWOW64\cmd.exe
PID 4568 wrote to memory of 2908 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\servicing\TrustedInstaller.exe
PID 4568 wrote to memory of 2908 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\servicing\TrustedInstaller.exe
PID 4568 wrote to memory of 2908 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\servicing\TrustedInstaller.exe
PID 2708 wrote to memory of 3176 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 3176 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 1504 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 1504 wrote to memory of 4756 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1504 wrote to memory of 4756 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 2708 wrote to memory of 1560 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 1560 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 1560 wrote to memory of 3724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 1560 wrote to memory of 3724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 2708 wrote to memory of 1064 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 1064 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 1064 wrote to memory of 3732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 1064 wrote to memory of 3732 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 2708 wrote to memory of 3496 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 3496 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 3496 wrote to memory of 3688 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 3496 wrote to memory of 3688 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 2708 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 5040 wrote to memory of 1996 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 5040 wrote to memory of 1996 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 2708 wrote to memory of 4112 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 4112 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 4112 wrote to memory of 1004 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 4112 wrote to memory of 1004 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 2708 wrote to memory of 3056 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 3056 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 3056 wrote to memory of 3880 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 3056 wrote to memory of 3880 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2708 wrote to memory of 4824 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 4824 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 4824 wrote to memory of 2332 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4824 wrote to memory of 2332 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2708 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 2708 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\main.exe C:\Windows\system32\cmd.exe
PID 4776 wrote to memory of 3592 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4776 wrote to memory of 3592 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe

Processes

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Gaming Chair.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAYgBwACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGQAeQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAbQBqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGQAbQBuACMAPgA="

C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe

"C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c sc start FairplayKD > NUL 2>&1

C:\Users\Admin\AppData\Local\Temp\main.exe

"C:\Users\Admin\AppData\Local\Temp\main.exe"

C:\Windows\SysWOW64\sc.exe

sc start FairplayKD

C:\Users\Admin\AppData\Local\Temp\main.exe

"C:\Users\Admin\AppData\Local\Temp\main.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c sc stop %c > NUL 2>&1

C:\Windows\SysWOW64\sc.exe

sc stop %c

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f"

C:\Windows\system32\reg.exe

reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /f

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f"

C:\Windows\system32\reg.exe

reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v empyrean /t REG_SZ /d C:\Users\Admin\AppData\Roaming\empyrean\run.bat /f

C:\Windows\servicing\TrustedInstaller.exe

C:\Windows\servicing\TrustedInstaller.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Windows\System32\wbem\WMIC.exe csproduct get uuid"

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"

C:\Windows\system32\netsh.exe

netsh wlan show profiles

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 ipapi.co udp
US 104.26.9.44:443 ipapi.co tcp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 44.9.26.104.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 www.cloudflare.com udp
US 104.16.123.96:443 www.cloudflare.com tcp
US 104.26.9.44:443 ipapi.co tcp
US 104.16.123.96:443 www.cloudflare.com tcp
US 104.26.9.44:443 ipapi.co tcp
US 8.8.8.8:53 96.123.16.104.in-addr.arpa udp
US 104.16.123.96:443 www.cloudflare.com tcp
US 104.26.9.44:443 ipapi.co tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 28.73.42.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Gaming Chair.exe

MD5 6b1ae040f09a43a4f0eee6fd964e2a47
SHA1 5d5ae0e6d89612fa55286f12f3a09443408ac1df
SHA256 d1163ec121ee6bdd11496c227b5f09a69cd2172aca93d111fac1be0cf73be0f2
SHA512 e6a7ad8d8245b7fa009b77c77e5d85059bcc6802247b72a5bf927a97390650d446f83984c43a3fd6cd5f5a35f747bda6b5d1e408aa59f212a856cc9eaca861a1

memory/1876-7-0x000000007406E000-0x000000007406F000-memory.dmp

memory/1876-12-0x0000000004C70000-0x0000000004CA6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\main.exe

MD5 20e800847b1b4b31342eec351c90e791
SHA1 eacead464cf795663624f235d27cad390e4fd621
SHA256 e1300ce31905bea06649b249550555180f7993901d4391c6d0d8dfdc4276b703
SHA512 a91a3e3ba287991fa4ed5506d7aa3663f665fbe0d67d765865fc2d65c6e8a7c2be2fb562eb34bf28b87d5a8404c625545cd7a424c91899eb6c1b6260f497a131

memory/1876-15-0x0000000005430000-0x0000000005A58000-memory.dmp

memory/1876-16-0x0000000074060000-0x0000000074810000-memory.dmp

memory/1876-19-0x0000000074060000-0x0000000074810000-memory.dmp

memory/1876-64-0x0000000005AA0000-0x0000000005AC2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dt3ih4gd.snp.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1876-95-0x0000000005BC0000-0x0000000005C26000-memory.dmp

memory/1876-94-0x0000000005B50000-0x0000000005BB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\python310.dll

MD5 69d4f13fbaeee9b551c2d9a4a94d4458
SHA1 69540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256 801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA512 8e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378

memory/1876-150-0x0000000005D30000-0x0000000006084000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\VCRUNTIME140.dll

MD5 870fea4e961e2fbd00110d3783e529be
SHA1 a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA256 76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA512 0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

memory/2708-151-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\base_library.zip

MD5 fbd6be906ac7cd45f1d98f5cb05f8275
SHA1 5d563877a549f493da805b4d049641604a6a0408
SHA256 ae35709e6b8538827e3999e61a0345680c5167962296ac7bef62d6b813227fb0
SHA512 1547b02875f3e547c4f5e15c964719c93d7088c7f4fd044f6561bebd29658a54ef044211f9d5cfb4570ca49ed0f17b08011d27fe85914e8c3ea12024c8071e8a

C:\Users\Admin\AppData\Local\Temp\_MEI40202\libffi-7.dll

MD5 b5150b41ca910f212a1dd236832eb472
SHA1 a17809732c562524b185953ffe60dfa91ba3ce7d
SHA256 1a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a
SHA512 9e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_bz2.pyd

MD5 758fff1d194a7ac7a1e3d98bcf143a44
SHA1 de1c61a8e1fb90666340f8b0a34e4d8bfc56da07
SHA256 f5e913a9f2adf7d599ea9bb105e144ba11699bbcb1514e73edcf7e062354e708
SHA512 468d7c52f14812d5bde1e505c95cb630e22d71282bda05bf66324f31560bfa06095cf60fc0d34877f8b361ccd65a1b61d0fd1f91d52facb0baf8e74f3fed31cc

memory/2708-168-0x00007FFF3FF50000-0x00007FFF3FF7D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_queue.pyd

MD5 0d267bb65918b55839a9400b0fb11aa2
SHA1 54e66a14bea8ae551ab6f8f48d81560b2add1afc
SHA256 13ee41980b7d0fb9ce07f8e41ee6a309e69a30bbf5b801942f41cbc357d59e9c
SHA512 c2375f46a98e44f54e2dd0a5cc5f016098500090bb78de520dc5e05aef8e6f11405d8f6964850a03060caed3628d0a6303091cba1f28a0aa9b3b814217d71e56

memory/1876-187-0x0000000006220000-0x000000000623E000-memory.dmp

memory/1876-188-0x0000000006770000-0x00000000067BC000-memory.dmp

memory/2708-186-0x00007FFF40160000-0x00007FFF4016D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\pythoncom310.dll

MD5 9051abae01a41ea13febdea7d93470c0
SHA1 b06bd4cd4fd453eb827a108e137320d5dc3a002f
SHA256 f12c8141d4795719035c89ff459823ed6174564136020739c106f08a6257b399
SHA512 58d8277ec4101ad468dd8c4b4a9353ab684ecc391e5f9db37de44d5c3316c17d4c7a5ffd547ce9b9a08c56e3dd6d3c87428eae12144dfb72fc448b0f2cfc47da

memory/2708-190-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\win32api.pyd

MD5 561f419a2b44158646ee13cd9af44c60
SHA1 93212788de48e0a91e603d74f071a7c8f42fe39b
SHA256 631465da2a1dad0cb11cd86b14b4a0e4c7708d5b1e8d6f40ae9e794520c3aaf7
SHA512 d76ab089f6dc1beffd5247e81d267f826706e60604a157676e6cbc3b3447f5bcee66a84bf35c21696c020362fadd814c3e0945942cdc5e0dfe44c0bca169945c

memory/2708-194-0x00007FFF40730000-0x00007FFF4075B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_uuid.pyd

MD5 81dfa68ca3cb20ced73316dbc78423f6
SHA1 8841cf22938aa6ee373ff770716bb9c6d9bc3e26
SHA256 d0cb6dd98a2c9d4134c6ec74e521bad734bc722d6a3b4722428bf79e7b66f190
SHA512 e24288ae627488251682cd47c1884f2dc5f4cd834d7959b9881e5739c42d91fd0a30e75f0de77f5b5a0d63d9baebcafa56851e7e40812df367fd433421c0ccdb

C:\Users\Admin\AppData\Local\Temp\_MEI40202\libcrypto-1_1.dll

MD5 da5fe6e5cfc41381025994f261df7148
SHA1 13998e241464952d2d34eb6e8ecfcd2eb1f19a64
SHA256 de045c36ae437a5b40fc90a8a7cc037facd5b7e307cfcf9a9087c5f1a6a2cf18
SHA512 a0d7ebf83204065236439d495eb3c97be093c41daac2e6cfbbb1aa8ffeac049402a3dea7139b1770d2e1a45e08623a56a94d64c8f0c5be74c5bae039a2bc6ca9

memory/2708-216-0x000001F0DA2C0000-0x000001F0DA635000-memory.dmp

memory/2708-215-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\unicodedata.pyd

MD5 ca3baebf8725c7d785710f1dfbb2736d
SHA1 8f9aec2732a252888f3873967d8cc0139ff7f4e5
SHA256 f2d03a39556491d1ace63447b067b38055f32f5f1523c01249ba18052c599b4c
SHA512 5c2397e4dcb361a154cd3887c229bcf7ef980acbb4b851a16294d5df6245b2615cc4b42f6a95cf1d3c49b735c2f7025447247d887ccf4cd964f19f14e4533470

C:\Users\Admin\AppData\Local\Temp\_MEI40202\sqlite3.dll

MD5 b70d218798c0fec39de1199c796ebce8
SHA1 73b9f8389706790a0fec3c7662c997d0a238a4a0
SHA256 4830e8d4ae005a73834371fe7bb5b91ca8a4c4c3a4b9a838939f18920f10faff
SHA512 2ede15cc8a229bfc599980ce7180a7a3c37c0264415470801cf098ef4dac7bcf857821f647614490c1b0865882619a24e3ac0848b5aea1796fad054c0dd6f718

memory/2708-248-0x00007FFF3EA50000-0x00007FFF3EA5B000-memory.dmp

memory/2708-264-0x00007FFF37810000-0x00007FFF37832000-memory.dmp

memory/2708-271-0x00007FFF341C0000-0x00007FFF341DE000-memory.dmp

memory/2708-275-0x00007FFF30040000-0x00007FFF30292000-memory.dmp

memory/2708-273-0x00007FFF31DF0000-0x00007FFF31E19000-memory.dmp

memory/2708-270-0x00007FFF341E0000-0x00007FFF341F1000-memory.dmp

memory/2708-269-0x00007FFF37110000-0x00007FFF3715D000-memory.dmp

memory/2708-268-0x00007FFF37160000-0x00007FFF37179000-memory.dmp

memory/2708-267-0x00007FFF377D0000-0x00007FFF377E6000-memory.dmp

memory/2708-266-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp

memory/2708-265-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\downloads_db

MD5 f310cf1ff562ae14449e0167a3e1fe46
SHA1 85c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256 e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA512 1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\vault\cookies.txt

MD5 e7df649e2ab84cdbca0dcb24d07cfe15
SHA1 ee4579c33e15e6ba653d30cb6d85b8fbc68ea1e4
SHA256 de5c66336ba01afb107f1440586597e955d0e5b2ec1a14e78b326fd57288e3b1
SHA512 693ada9e83e503fd31ca0591b5045bee4cd0a8d5aeb142c5e8b9fd546a614159917a49fa31edf06df08f666c3f9cef1ee0019e8be24c6ffec8d2ea97e2f308f4

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\downloads_db

MD5 9618e15b04a4ddb39ed6c496575f6f95
SHA1 1c28f8750e5555776b3c80b187c5d15a443a7412
SHA256 a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512 f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

memory/2708-263-0x00007FFF377F0000-0x00007FFF3780B000-memory.dmp

memory/2708-262-0x00007FFF3BF70000-0x00007FFF3BF80000-memory.dmp

memory/2708-261-0x00007FFF3BF50000-0x00007FFF3BF64000-memory.dmp

memory/2708-260-0x00007FFF3BF80000-0x00007FFF3BF95000-memory.dmp

memory/2708-259-0x00007FFF3BFA0000-0x00007FFF3BFAC000-memory.dmp

memory/2708-258-0x00007FFF3BFB0000-0x00007FFF3BFC2000-memory.dmp

memory/2708-257-0x00007FFF3DA10000-0x00007FFF3DA1C000-memory.dmp

memory/2708-256-0x00007FFF3D160000-0x00007FFF3D16D000-memory.dmp

memory/2708-255-0x00007FFF3D170000-0x00007FFF3D17C000-memory.dmp

memory/2708-254-0x00007FFF3D180000-0x00007FFF3D18C000-memory.dmp

memory/2708-253-0x00007FFF3D190000-0x00007FFF3D19B000-memory.dmp

memory/2708-252-0x00007FFF3D1A0000-0x00007FFF3D1AB000-memory.dmp

memory/2708-251-0x00007FFF3D1B0000-0x00007FFF3D1BC000-memory.dmp

memory/2708-250-0x00007FFF3EA40000-0x00007FFF3EA4C000-memory.dmp

memory/2708-249-0x000001F0DA2C0000-0x000001F0DA635000-memory.dmp

memory/2708-247-0x00007FFF3DA20000-0x00007FFF3DA2E000-memory.dmp

memory/2708-246-0x00007FFF3DA30000-0x00007FFF3DA3D000-memory.dmp

memory/2708-245-0x00007FFF3DA40000-0x00007FFF3DA4C000-memory.dmp

memory/2708-244-0x00007FFF3EA30000-0x00007FFF3EA3B000-memory.dmp

memory/2708-243-0x00007FFF3EA60000-0x00007FFF3EA6C000-memory.dmp

memory/2708-242-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp

memory/2708-241-0x00007FFF31280000-0x00007FFF31338000-memory.dmp

memory/2708-240-0x00007FFF3EA90000-0x00007FFF3EA9B000-memory.dmp

memory/2708-239-0x00007FFF3EAF0000-0x00007FFF3EB1E000-memory.dmp

memory/2708-238-0x00007FFF3F5F0000-0x00007FFF3F5FB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\Crypto\Cipher\_raw_ecb.pyd

MD5 f94726f6b584647142ea6d5818b0349d
SHA1 4aa9931c0ff214bf520c5e82d8e73ceeb08af27c
SHA256 b98297fd093e8af7fca2628c23a9916e767540c3c6fa8894394b5b97ffec3174
SHA512 2b40a9b39f5d09eb8d7ddad849c8a08ab2e73574ee0d5db132fe8c8c3772e60298e0545516c9c26ee0b257ebda59cfe1f56ef6c4357ef5be9017c4db4770d238

memory/2708-235-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp

memory/2708-233-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_sqlite3.pyd

MD5 7b45afc909647c373749ef946c67d7cf
SHA1 81f813c1d8c4b6497c01615dcb6aa40b92a7bd20
SHA256 a5f39bfd2b43799922e303a3490164c882f6e630777a3a0998e89235dc513b5e
SHA512 fe67e58f30a2c95d7d42a102ed818f4d57baa524c5c2d781c933de201028c75084c3e836ff4237e066f3c7dd6a5492933c3da3fee76eb2c50a6915996ef6d7fb

memory/2708-229-0x00007FFF31160000-0x00007FFF31278000-memory.dmp

memory/2708-228-0x00007FFF3EAA0000-0x00007FFF3EAC7000-memory.dmp

memory/2708-227-0x00007FFF44250000-0x00007FFF4425B000-memory.dmp

memory/2708-225-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\charset_normalizer\md__mypyc.cp310-win_amd64.pyd

MD5 150731368d678f5b2f9ea8cb1a966b8a
SHA1 8263055aee278b6724e30aff7bd4bd471bb1c904
SHA256 08bbccf9be3982bbb356e5df1e6fddaa94bb5f12b765bca7bd5701c86141f814
SHA512 a5e984f9995e13fefd8a1750b8fef7670cfef11ff019880af06d4dff453416b43e077084f529e37fc24f4a70c1951cfc101f2611d7c860924bbf2922a98027a8

memory/2708-222-0x00007FFF3FDC0000-0x00007FFF3FDD4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\charset_normalizer\md.cp310-win_amd64.pyd

MD5 ac03714161da507e824756742a877da9
SHA1 702dbd2296ca50f6502bc5aac5b826b63cf9e200
SHA256 cafc9c2befc85af6cc0f9cf0fa7681bae89c9acf511cadc39a0cee77d174b2c2
SHA512 6b773b2f31512211a0944391733b77f25ef720d07a4057ab8432941950403faced50c8bc3166b36f648e6394bdf0d9943ccd81e689622558719dfe782c59bb2c

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_hashlib.pyd

MD5 0d723bc34592d5bb2b32cf259858d80e
SHA1 eacfabd037ba5890885656f2485c2d7226a19d17
SHA256 f2b927aaa856d23f628b01380d5a19bfe9233db39c9078c0e0585d376948c13f
SHA512 3e79455554d527d380adca39ac10dbf3914ca4980d8ee009b7daf30aeb4e9359d9d890403da9cc2b69327c695c57374c390fa780a8fd6148bbea3136138ead33

memory/2708-212-0x00007FFF31280000-0x00007FFF31338000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\libssl-1_1.dll

MD5 48d792202922fffe8ea12798f03d94de
SHA1 f8818be47becb8ccf2907399f62019c3be0efeb5
SHA256 8221a76831a103b2b2ae01c3702d0bba4f82f2afd4390a3727056e60b28650cc
SHA512 69f3a8b556dd517ae89084623f499ef89bd0f97031e3006677ceed330ed13fcc56bf3cde5c9ed0fc6c440487d13899ffda775e6a967966294cadfd70069b2833

memory/2708-209-0x00007FFF3EAF0000-0x00007FFF3EB1E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_ssl.pyd

MD5 1e643c629f993a63045b0ff70d6cf7c6
SHA1 9af2d22226e57dc16c199cad002e3beb6a0a0058
SHA256 4a50b4b77bf9e5d6f62c7850589b80b4caa775c81856b0d84cb1a73d397eb38a
SHA512 9d8cd6e9c03880cc015e87059db28ff588881679f8e3f5a26a90f13e2c34a5bd03fb7329d9a4e33c4a01209c85a36fc999e77d9ece42cebdb738c2f1fd6775af

memory/2708-205-0x00007FFF40710000-0x00007FFF4072C000-memory.dmp

memory/2708-204-0x00007FFF44260000-0x00007FFF4426A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\psutil\_psutil_windows.pyd

MD5 fb17b2f2f09725c3ffca6345acd7f0a8
SHA1 b8d747cc0cb9f7646181536d9451d91d83b9fc61
SHA256 9c7d401418db14353db85b54ff8c7773ee5d17cbf9a20085fde4af652bd24fc4
SHA512 b4acb60045da8639779b6bb01175b13344c3705c92ea55f9c2942f06c89e5f43cedae8c691836d63183cacf2d0a98aa3bcb0354528f1707956b252206991bf63

memory/2708-200-0x00007FFF3FA80000-0x00007FFF3FAC2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_decimal.pyd

MD5 eb45ea265a48348ce0ac4124cb72df22
SHA1 ecdc1d76a205f482d1ed9c25445fa6d8f73a1422
SHA256 3881f00dbc4aadf9e87b44c316d93425a8f6ba73d72790987226238defbc7279
SHA512 f7367bf2a2d221a7508d767ad754b61b2b02cdd7ae36ae25b306f3443d4800d50404ac7e503f589450ed023ff79a2fb1de89a30a49aa1dd32746c3e041494013

memory/2708-193-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp

memory/2708-185-0x00007FFF3FAD0000-0x00007FFF3FAFE000-memory.dmp

memory/2708-184-0x00007FFF40170000-0x00007FFF4017D000-memory.dmp

memory/1876-183-0x0000000074060000-0x0000000074810000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\VCRUNTIME140_1.dll

MD5 bba9680bc310d8d25e97b12463196c92
SHA1 9a480c0cf9d377a4caedd4ea60e90fa79001f03a
SHA256 e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab
SHA512 1575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739

C:\Users\Admin\AppData\Local\Temp\_MEI40202\pywintypes310.dll

MD5 6f2aa8fa02f59671f99083f9cef12cda
SHA1 9fd0716bcde6ac01cd916be28aa4297c5d4791cd
SHA256 1a15d98d4f9622fa81b60876a5f359707a88fbbbae3ae4e0c799192c378ef8c6
SHA512 f5d5112e63307068cdb1d0670fe24b65a9f4942a39416f537bdbc17dedfd99963861bf0f4e94299cdce874816f27b3d86c4bebb889c3162c666d5ee92229c211

memory/2708-176-0x00007FFF401F0000-0x00007FFF40209000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\select.pyd

MD5 72009cde5945de0673a11efb521c8ccd
SHA1 bddb47ac13c6302a871a53ba303001837939f837
SHA256 5aaa15868421a46461156e7817a69eeeb10b29c1e826a9155b5f8854facf3dca
SHA512 d00a42700c9201f23a44fd9407fea7ea9df1014c976133f33ff711150727bf160941373d53f3a973f7dd6ca7b5502e178c2b88ea1815ca8bce1a239ed5d8256d

memory/2708-173-0x00007FFF3FF10000-0x00007FFF3FF44000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_socket.pyd

MD5 afd296823375e106c4b1ac8b39927f8b
SHA1 b05d811e5a5921d5b5cc90b9e4763fd63783587b
SHA256 e423a7c2ce5825dfdd41cfc99c049ff92abfb2aa394c85d0a9a11de7f8673007
SHA512 95e98a24be9e603b2870b787349e2aa7734014ac088c691063e4078e11a04898c9c547d6998224b1b171fc4802039c3078a28c7e81d59f6497f2f9230d8c9369

C:\Users\Admin\AppData\Local\Temp\_MEI40202\pyexpat.pyd

MD5 5a328b011fa748939264318a433297e2
SHA1 d46dd2be7c452e5b6525e88a2d29179f4c07de65
SHA256 e8a81b47029e8500e0f4e04ccf81f8bdf23a599a2b5cd627095678cdf2fabc14
SHA512 06fa8262378634a42f5ab8c1e5f6716202544c8b304de327a08aa20c8f888114746f69b725ed3088d975d09094df7c3a37338a93983b957723aa2b7fda597f87

memory/2708-167-0x00007FFF406B0000-0x00007FFF406C9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_lzma.pyd

MD5 abceeceaeff3798b5b0de412af610f58
SHA1 c3c94c120b5bed8bccf8104d933e96ac6e42ca90
SHA256 216aa4bb6f62dd250fd6d2dcde14709aa82e320b946a21edeec7344ed6c2c62e
SHA512 3e1a2eb86605aa851a0c5153f7be399f6259ecaad86dbcbf12eeae5f985dc2ea2ab25683285e02b787a5b75f7df70b4182ae8f1567946f99ad2ec7b27d4c7955

memory/2708-161-0x00007FFF407F0000-0x00007FFF407FF000-memory.dmp

memory/2708-160-0x00007FFF40210000-0x00007FFF40234000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI40202\python3.dll

MD5 c17b7a4b853827f538576f4c3521c653
SHA1 6115047d02fbbad4ff32afb4ebd439f5d529485a
SHA256 d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68
SHA512 8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7

C:\Users\Admin\AppData\Local\Temp\_MEI40202\_ctypes.pyd

MD5 6ca9a99c75a0b7b6a22681aa8e5ad77b
SHA1 dd1118b7d77be6bb33b81da65f6b5dc153a4b1e8
SHA256 d39390552c55d8fd4940864905cd4437bc3f8efe7ff3ca220543b2c0efab04f8
SHA512 b0b5f2979747d2f6796d415dd300848f32b4e79ede59827ac447af0f4ea8709b60d6935d09e579299b3bc54b6c0f10972f17f6c0d1759c5388ad5b14689a23fe

memory/1876-325-0x00000000071E0000-0x0000000007212000-memory.dmp

memory/1876-326-0x0000000071090000-0x00000000710DC000-memory.dmp

memory/1876-336-0x00000000067F0000-0x000000000680E000-memory.dmp

memory/1876-337-0x0000000007220000-0x00000000072C3000-memory.dmp

memory/1876-338-0x0000000007BA0000-0x000000000821A000-memory.dmp

memory/1876-339-0x0000000007550000-0x000000000756A000-memory.dmp

memory/2708-340-0x00007FFF37810000-0x00007FFF37832000-memory.dmp

memory/1876-341-0x00000000075C0000-0x00000000075CA000-memory.dmp

memory/1876-342-0x00000000077E0000-0x0000000007876000-memory.dmp

memory/1876-343-0x0000000007750000-0x0000000007761000-memory.dmp

memory/1876-344-0x0000000007790000-0x000000000779E000-memory.dmp

memory/1876-345-0x00000000077A0000-0x00000000077B4000-memory.dmp

memory/1876-346-0x0000000007880000-0x000000000789A000-memory.dmp

memory/1876-347-0x00000000077D0000-0x00000000077D8000-memory.dmp

memory/2708-357-0x00007FFF3FAD0000-0x00007FFF3FAFE000-memory.dmp

memory/2708-370-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp

memory/2708-371-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp

memory/2708-365-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp

memory/2708-364-0x00007FFF31280000-0x00007FFF31338000-memory.dmp

memory/2708-363-0x00007FFF3EAF0000-0x00007FFF3EB1E000-memory.dmp

memory/2708-362-0x00007FFF40710000-0x00007FFF4072C000-memory.dmp

memory/2708-358-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp

memory/2708-348-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp

memory/2708-354-0x00007FFF401F0000-0x00007FFF40209000-memory.dmp

memory/2708-349-0x00007FFF40210000-0x00007FFF40234000-memory.dmp

memory/1876-374-0x0000000074060000-0x0000000074810000-memory.dmp

memory/2708-375-0x00007FFF377D0000-0x00007FFF377E6000-memory.dmp

memory/2708-376-0x00007FFF30040000-0x00007FFF30292000-memory.dmp

memory/2708-405-0x00007FFF3FA60000-0x00007FFF3FA7F000-memory.dmp

memory/2708-409-0x00007FFF40160000-0x00007FFF4016D000-memory.dmp

memory/2708-410-0x00007FFF307F0000-0x00007FFF30C5E000-memory.dmp

memory/2708-408-0x00007FFF3FF50000-0x00007FFF3FF7D000-memory.dmp

memory/2708-407-0x00007FFF377D0000-0x00007FFF377E6000-memory.dmp

memory/2708-402-0x00007FFF44250000-0x00007FFF4425B000-memory.dmp

memory/2708-401-0x00007FFF3FDC0000-0x00007FFF3FDD4000-memory.dmp

memory/2708-400-0x00007FFF30470000-0x00007FFF307E5000-memory.dmp

memory/2708-399-0x00007FFF31280000-0x00007FFF31338000-memory.dmp

memory/2708-406-0x00007FFF302F0000-0x00007FFF30461000-memory.dmp

memory/2708-393-0x00007FFF40900000-0x00007FFF409BC000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1799s

Max time network

1686s

Command Line

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe"

Signatures

Browser Information Discovery

discovery

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133745098245713576" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3092 wrote to memory of 1444 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1444 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1252 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 1664 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3092 wrote to memory of 2868 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\bin\gcc.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb0803cc40,0x7ffb0803cc4c,0x7ffb0803cc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3132 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3720,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3732 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4644,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4692,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4396 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4392,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4776 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4992,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3288,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5272,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:8

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1040,i,18403585864266622004,16841561076760661490,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4968 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 72.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 216.58.212.196:443 www.google.com tcp
US 8.8.8.8:53 227.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 234.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 196.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
GB 142.250.200.46:443 apis.google.com udp
GB 142.250.200.10:443 ogads-pa.googleapis.com udp
GB 142.250.200.10:443 ogads-pa.googleapis.com tcp
US 8.8.8.8:53 46.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.187.206:443 play.google.com udp
GB 142.250.187.206:443 play.google.com tcp
US 8.8.8.8:53 206.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com udp
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 clients2.google.com tcp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 paste.tc udp
US 104.21.46.120:443 paste.tc tcp
US 104.21.46.120:443 paste.tc tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 8.8.8.8:53 maxcdn.bootstrapcdn.com udp
US 104.21.46.120:443 paste.tc udp
US 8.8.8.8:53 cdnjs.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 8.8.8.8:53 120.46.21.104.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 207.11.18.104.in-addr.arpa udp
US 8.8.8.8:53 14.25.17.104.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 104.18.11.207:443 maxcdn.bootstrapcdn.com udp
US 8.8.8.8:53 region1.google-analytics.com udp
US 216.239.34.36:443 region1.google-analytics.com tcp
US 8.8.8.8:53 232.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 36.34.239.216.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 216.239.34.36:443 region1.google-analytics.com udp
US 8.8.8.8:53 www.resimupload.org udp
US 8.8.8.8:53 api.qrserver.com udp
US 104.17.25.14:443 cdnjs.cloudflare.com udp
DE 159.69.246.187:443 api.qrserver.com tcp
US 104.21.66.162:443 www.resimupload.org tcp
US 104.21.66.162:443 www.resimupload.org tcp
US 104.21.66.162:443 www.resimupload.org tcp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 142.250.178.10:443 content-autofill.googleapis.com tcp
GB 142.250.178.10:443 content-autofill.googleapis.com udp
US 8.8.8.8:53 162.66.21.104.in-addr.arpa udp
US 8.8.8.8:53 187.246.69.159.in-addr.arpa udp
US 8.8.8.8:53 10.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 34.197.79.40.in-addr.arpa udp

Files

memory/780-1-0x0000000066200000-0x00000000662EB000-memory.dmp

memory/780-0-0x0000000000400000-0x00000000004CE000-memory.dmp

\??\pipe\crashpad_3092_ZQXOUCHZUUOPZLCA

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 a5231f69d15dcc65f702b42b9c85ed26
SHA1 64e0413d906a744dc618081ee28bc4684a91dda2
SHA256 0ff7b0ef729653c0b90e6774c8412662a1b2218c71f0393a80050a40033199fa
SHA512 5461ed6eb39ac1211e802e4e113b154048eb8c563b26f1877694afa233341b671454eaee5c2e4399ba9160cf9cc530f60c3661141527870948315d05eaf35b50

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 6f8a799e14592effe23c8162f208a833
SHA1 74ec5072ce4330ffacb7d02b0e28be9201a6d394
SHA256 e6bef29caf4089554f2568475efaa62ae7dc3f8592515a10f9097bbd1bfe2f81
SHA512 f0107f0f6e278ca7e9f88869c6227811cdfa2b8077c7371f218188120314d90ffe9bf76d44fef833064a6c3e029f8e179912ca6049f06e0bec9c68c1c01b39fd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f1910ddd8635aa2d39344a8dd7edb272
SHA1 563e839f883c28d61fb6bc088004bb7b1e6bf1fd
SHA256 0af54bd91493d40ed1fc819a5db697fb43853a27e08e924ed7fcd6e26e29fc34
SHA512 fdc5a7c2c27ae07ad5e4542fffb60e1cfc0d8e3753dc5bb635f12aacd5da053d164460ef97bbf5f9aca89793c2774b2c54e39e9f720dc68412be4e0abdc777c6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 957eb4565e4f9289794e354c9b7e33ed
SHA1 59ebee111ec35a931d50ff967b325696798d204f
SHA256 f1e1b94e75a12f7e1affd899ad337b49d2adffce8b7dffad1b3a8794c79ca55d
SHA512 bc94c36806bbd212997b1f20d3a22ecf0664756631137972be265e828546031f23d869c358ab92ebdf4dfbd9c14609c75543a46ce9c5b483d2f9f845b856954f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 fb27ef5775024e01a112f20abf155c1f
SHA1 5d8687a30406990c139157649bfbb9a70fe5c8cf
SHA256 0d64053f939efa765a045ffbc3d03b4d715e4b17ef36fd36d392fc4ba8f6cccf
SHA512 b3df2260f2cd00856706b21a626aaf800875e4ef7e4ef5d1173e85955967e3735ecb0619d091fef1c27b3d2e7a28cdc6713c2a55d205dc552d8c47ba04e8f784

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 79db3a63c8d6bce9ba1474fee0dd9eb2
SHA1 a3895afa81139fb69f0e437e45b32eb2c0c53533
SHA256 370b7073b1bf0072d3cc79969760d0b451327289b21826ccdc6275fe583cee94
SHA512 6222189d60c2722ce836459de3fc64af15733e0535e09c8d3d28183ed180a18e79b6f34e67efa83f79372d9cde53a32cae80a21af20bb63b763d93767474cb5f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 ebaa4f395bb2d71d16fbdd48cc68bc7f
SHA1 22d594c6f317cc39863a728101bc67afdc0368a8
SHA256 d5ec43ac102c14980e5c0c116c15aea13dd0efc00e5c8d7922e539682c4268f7
SHA512 54b888e22e83bce43ced1bd1b2ccfd1998343b49990675efc1e51b052f4ad42bb3b53afcc6b578ac2bf749e741c88bbec7fe06ee45337d9e88e191ba95480156

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8f44cc4fa74818b589fc4c4768e9604e
SHA1 acca6dde8f6605cd365783ffb85ac6a95e79525c
SHA256 bca37a9d166ccdfd5ead13d7c58a433ef3b975a31d45cc5a339f94c7da9e72cc
SHA512 21fdda0ecc292641c235e0c3bf24694b0f2c47f79f2c0017fed090ba1a23ceda439f0f72428076d882afcf362865589edac3e0a8f7df796ac87702385775dd3a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 7f580ca3cac1b6361fda3528e65dfb31
SHA1 175b02395de3ca2bf5d6925aceabb5aa04a68180
SHA256 23e37ccc9a9eb0366554a393e878057de7d81649fd6b3d58c3b6aa465e85a9a5
SHA512 2e2283b8c9f11f81ef36a7954ee0abd4a0ff9cf0562e116dfe8ab8ee66a739621a8ad397f43fe26e19920663538817975c630aeafa298294749b541cf6ff4d85

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 11c663d10000a0a8f2dc347fddf9257e
SHA1 d2a9a04b1fa3e63a39f5e1bd051d311f7fcf7cff
SHA256 0525587cd2d46803154158df2cbaaa0eed8a902ed602b7fba7bd0847583125a9
SHA512 db953dca03c91e50834ebaee550aa0ebbf5b214fbeb3d7dc91047118e9773dd228c2436497caa807845f7a82c17c211a50518f958308b6c37273944d24cad3ea

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 99f6e7b40873c780edf4c03a23876c14
SHA1 00d876c0d64ef1bf212e37a77f817a80b58c552b
SHA256 c5f72741aa96b73b315909102f92bce18a2017ecb4850db36a20441fe14d41ea
SHA512 114573da71dbc4893aed0be9d67bfb1ded801e91f1ddd127687673e52d994f25dc7ce1e08ad32388d142095322b75f033f1ba3db04dbdce2b41e1efb8d9d8715

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 3253f07448d0d10fcb0dc726c1f4c1cc
SHA1 2619762caf51b6ff59f9cfb39a2de880cdd8fcfd
SHA256 15cffd3081a8fdafae628b662391e225f450f53aa19e1a25f65d8dbd68710a3c
SHA512 40aeae8b656079600a81c89d221f13a1dca5bfe533b70f3ca0d19220bdd9d4b0983acd53b47713dd35446c052b6bef9f02daea8cab4b1668574713b9d4a07537

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f9d644b7bc08c9f242d18fe9aadef841
SHA1 9df1bca488f91cc4c8620296cb7673a7d1d50bd8
SHA256 72ed1320566de4abc56232c7e531af06b568f55f853c4922208db4d6f0ca4a4a
SHA512 f3a6e7dab13d726ff27113278dbb9935475e685a681239f7d62f372fcffc6c470e5f0d585151c9023048cfbc8188408a72615d86fbeda97bbcd55f2905f380e2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index

MD5 64b66b8c06b0b1d9f898a7992b3b29e6
SHA1 f1d27cb9e175b1a45ba273611b0d9cb883ffad8e
SHA256 d57f8a452fa13d488d60ce57b1cae6c937ec1f82fbdd2ae5899cd92c8a44c1c4
SHA512 b90de3689c26c1a95ef06e290d7a54a58c54785259689487634ee89e9e50e25a8d0a87df828088cd6bc0edb7d4e2e012135a54bde45f1fb8606312cdcbdd7dc9

C:\Users\Admin\Downloads\x54uwn3pph.rar

MD5 7c6862d02c2a378e8107088629782b3d
SHA1 c9317e2facc3358910857285f8ad15d2a3532cb3
SHA256 a12269430ce9e0791ad5dd7248d2e2ae14ddd2ade4a20af3987b1256218baa51
SHA512 aed9c774c61d999815eb19efa70cb3d402cdb64babba43975cea036dcebf69880b8c089f6ed8e82fb883c902dabc5ee5843178888920cdceeb169606039b7df1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f28c4774b3a91c7e7d2d1aac4d2477a7
SHA1 857bf82676e0b2f90e398578f24f64d05ba9ec16
SHA256 b422165816c84a154e69473e9e6e7afc7ea606488a86280f0b53a40a9a5801ef
SHA512 c6e9305525967ff96bd9b211d92e82b90ca5917397d1ee93af95f9974ed2873a6b8ac1fddcc232927933485ae22628f7f2e729ebcf8277e793010557f7ecea85

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 ab1f85e9c54caaa6aeb4829585d3950a
SHA1 76248a187d18639b2bfb3d3e83fa7ded6909c837
SHA256 ef7a6aee72deb3df8d407a0c5db636eb59142bd58cb0397299c61f5f036599ba
SHA512 6df4ce36a04e89e91e33c3ca9e84574b219fef28e941753d827b5722f40e4823b72110f62fc2166fda13cf3c0256314d15e327133f7305f2f56e80d797228cbf

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f92821facf6e2f8e8107dc567fb26971
SHA1 d6b489a2ae59028b186db719492a3e03f1bc4007
SHA256 4fc1430efd95c25c5f8f971ef8a006ddd103f2a7b3ffdbae41b3708bf5d4997f
SHA512 a7c2336b398766200b49880ee1f5c1c04b4729aad556913134e03b6303f7c45d3eb88ef912b62413cc2ef8fd4be04b97b42cfe85a69b8a7ebc8c0dffc4d1debe

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 6f9d7498c3441d8185c365489fd8457d
SHA1 467341e4020b6223f2ee0e21b5c95cd5ab0f20f2
SHA256 b1b423ae80791ba334014b8fa472a5305c793e89ea5bc8a16e6d2f3d51100ad1
SHA512 42aaa4dd446168b2c47cf8fb120d48ccbd1c18641b8c40945b2c1ac96da7a323032e3d28af36aa3e79606291bbd69112c860fc0a5e2a6b0e4f118e41c5454cc0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 88847997eb794ced548b4871f1c333c3
SHA1 71c579249196d471215fc8a7afa796c11b0b2d75
SHA256 d20988fa79387431a4acd84bd6022e32bd3507a7d8598bd97b2da33dd868168e
SHA512 5092d5e5aa3a39cd382889544c44cd0e912a9b7e64f1626220a0c634150dd0340f717ccbbe9ebf384774df44a080c4f91473ecb10147f3f050737e9a3089b598

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f8c73dff75ad03c0eb915c76da13bc2a
SHA1 1c2975538d339e7d4771d879e40fdd0f854a4c18
SHA256 09b9e79f41cc044a8311c4396516143920dc73b955854fca8c9437e925ea5717
SHA512 5b4ca903c255dddb34d9796300705be11315ff44a92f2290e86f79b8ecfeaa6b1528315a30bc94fe2edd0d1786d2637c7ab6ea544406f8ea48c3c40f8be46fd8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1054b62e27dada4dd234e1c37808d2f5
SHA1 c41e6a6ee5d47800b22a127e83c3d0ba5a671b16
SHA256 7a438a1818e93054ce0f1500f2b4b8e955271ec5d33f185341e1226b5b81133e
SHA512 2324753601129142a87ec3841f74c8357f2108c68e35360106a10612a894c50816423f176ac405212d1b126695c5b74e10085ee0f6833862329507882305897b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 ff20f713100dcd7ee608bcc5fc9f1c78
SHA1 12ea2066fabdb2aad5567b50f76c1e2a799c646e
SHA256 4232ddfdb3fabb1d59c2e29fea7a76bac258ca9b8f8bcfff8470a84058ec7b59
SHA512 dc5c7b1a913d12b9bbd5f93f7e4e55dd5e253d4f580cd9521e502e1d7ac313dab999e9b3e341e59fc28d29ef21ccebf3dcb711d17cdda659b6dd07056d3399d3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 262720e130a47e6c95b50e69926a183e
SHA1 7e3b80bb3469b19b06ff76ce2e2921c23043adc4
SHA256 b3cf0c419021473857ee3843e79aa539be2ef2be3dc71a00d552015ee103abf1
SHA512 1fbd472240e2f1d47d97477544720b72bf0c7422ae2145a40aac309faeb3d5e5bea4bee4ef313d9727e18740fd0e3d80434156159086b30a1ab43c3c5a163f2e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 53aa3b19a1e9ae9be65329a90351277e
SHA1 03b09b9155f93167551100056984e61a77d6137e
SHA256 7ba0df60160541d83f00dfee1453520fe9924bac9ddf54075452b94c29083d4a
SHA512 834eaaa22a3358f4dcb9cdd7662cc95055f6e88502f24cc0407bb109b30a04730a335e107f72f6dbdbe40c131ba66809acfcc779bd9ae5a5687fe94d6e782443

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1662dbe298eb4c6ff0cb6e8a8abf71f9
SHA1 7841eea01738119c219359696e90835d5486dcf5
SHA256 e67481c30eaf6bd3cb8e93c78a0b03934456f03cac17fc248a00feaa61c69cef
SHA512 f63c6dffa81e295a2844ad2f35098543968de8c6f2e4575d610d8af6a4d475d3c1eebfa0d8322566008362f5efe4a2279beea8b2845df692e7f06852a8126f91

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 e1adb0da9e5f637236acdf19f8235479
SHA1 8609b03753ca4f3ee3e63b968c5a00ee010baa64
SHA256 d9886ca2c6a27aa90b861a5125a66fc030c09aa70c527c4f16ab4c7923d400f3
SHA512 8174f365c14c7a886cbe8123627fc8212e34363604e386fa76d1c7c16a622f6020a878e6c64ddcf9e0f7b12c8fec60a1615cacc4a03c3fde3f479fc746f885e6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8a6bc50bc4baf10a31d5facb2a5df232
SHA1 9bf30f02a8c908c7bb7ffa788b0cf3470427e876
SHA256 e2319aa7975f0cc24b8d874817fe12e8914cde459d77e198f8fa58efa41b29b5
SHA512 30a57071de8bab7cce802fc3f457c50eef9b499a3526c8d70d02a69d68d5285213d0c017ec372bb153053458a6537d71af831cd4a2cce0a7e5d37150a6ee9d1d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 9d1a241a1dda0d6357bd3ad05d7d141b
SHA1 829eb300cfc519fbf5e369af1cd857874f0be47b
SHA256 69dd16139ea45dc50623957176f649641fe9a34d3af44275d722eeaee147b65a
SHA512 a6bd78016edf64cf1310b65a62443a33211d4a43f3e62b1b67371722bfc758db0d8f707b20ae316b6d5e58305b8bbafd27cf519420fdfa42e90b055f47b53d47

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 02edae6b39f3b6f36bdf1dda1b3da76f
SHA1 6eefd9a2cef16674a49dd7c26629dfeaf1337eed
SHA256 e466111787666df51ecad55df02d8d1e4f68604b91d51f6c68da55e23fc6216c
SHA512 f9aea1e8c6e8d0c5d78b71edf6c0ad5375e34e336120bab7a64ab8ab25baa644a41b7ed757005a4d9a64195820a502e5d8d51543c0f791f04459f27841d31453

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 819c51d0e8d0e8d2c7d079133b1d9330
SHA1 690fae31a7b3c7a46556d4e40ca7e5e4422f711a
SHA256 759f586c91566d21d812d35cd7249e9c4cd86e66fb94c093afee0fd18a0f8856
SHA512 2bb1d581d1795053dec0b910e7afb80b67707a634efb93111bdcf7fe7e06ebbdae4c81f9693d10861ba7dc26fe196a09120cb4a6b7ad18fb63d7ac5aac68ffd1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 b1ad506a20ddc57ef60ea89fa72d00de
SHA1 7c110cf7d14679e1234b37965be8aee454862500
SHA256 953a5a1b6e7590016cb1b6386c53adffd383ccddbbd41df35d80c36e1cb51382
SHA512 ebd154e91337e7bb73b09ee92e963dd697b42c267121e6d90df78d5d463fb692fc0453f578543bd330d0e3dc45b7ce8a00086c4b87694fdaa626519956777bb7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 3f0d2ea889ce12621a77c7bf8b836729
SHA1 440344d666a03153032e9ea006d7874275357d5c
SHA256 14a153435ce067dc76366ef3418dbedda5539442316d1052a651cf890380ffe3
SHA512 a8997d8ea78a70a4117154a856e42c44ba971a27d119da1453d137fb1423e31e41dbdc12dfe9099b1cf52ef1c3efb5bb04031afdbe1c48cadf079a47afeaf81d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 bf02f4a6f1968a91a0072238438589ad
SHA1 70ef560942174540c3b719a602f6edb4dca90bda
SHA256 cc2b05fe2c6bd2264e501ec1d15a08b10f1d405dd240705d11304e053b90f6c5
SHA512 57f014f1a3fa1a232185df644e71064b2bdfb33f83c48a6bba58d9ecb2519bbbedaa86dfb8f5fac1f90a598d82fbf7a93822dd366a34de262263746addbe7f97

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 4eb5660c92bd802a2ef741c7ddacc440
SHA1 8efd3ebe2a263e86133c0f31b65163bd6a186418
SHA256 a338ec4f543cfbe81f6280ae09dc57669762e829e32044fc0ced72bb63d47475
SHA512 825f06afacbc370517243706de5233b12fefa5cf5e6217593988f735335c3ee25c5da95afec4d911a9a33f5c99dc9219e87d118a1b91287892958fff5410e829

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 24be28fe3cbe6ad0a987626cb1e5679b
SHA1 4fb4e46a1d291c2a0ed27cd6363be57506720151
SHA256 2de0b38611f77e2df93563afa82a6479f46d21e8da11b906dce3607dd4c6011d
SHA512 25c0aedf28c5c3f4a991cfc53f41b47237548867d3d242df8a46dd65306ef66b95f3fcfbe31366e0e1ead47b620908049208735fe0ba551641dae5ae15439b7d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 bd71080928a73b9c8392ac6eac3ab9c8
SHA1 fe22c66c1a01dbd8911b5193fbd21c3b3f91d908
SHA256 0659202c47c97a76c5c5b9a46371ebb4634c9bab42f82615c5b3782814229763
SHA512 77734f5b34f7acb7701318bb2aa34d9a68a0eff9709b10ea370188f0db158abb6dd8eb6a2a297b8f77fdb6907990cc686464a87143cda974182bb35413967c3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 cab6c3a6723bcf8403cf533c48f90e5a
SHA1 552e83065728c8b854e0452063870b3a1148b9b6
SHA256 be77f232e3e2f7a4c1c9bd704378a79ddbce936c28e3a85f00733a9f6c39712d
SHA512 40dd3e3747d19d77676f6e773cd4641346cccdf4aef34af6093ae84b9433084abfab54de6e81e350a00fbd3ab598fc1425557297be605329202309cccdf02693

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 112e73452178a1f5872a2e2c6ba02bb4
SHA1 e26ceee32f12f7fe63471ae118f61a65a5304be6
SHA256 143b993ac3f493ed93825a1fb7d4ba2ed220255188489636c2ab8c98ccd600f3
SHA512 260a43aa1d801b09eda268124d4b5327a97d22d2178f5dcc7c31848fecef48ac8b2f9aab9d2922e96421ae5006baa1d10186d504c1ff29ec88ba6a68d5d3c61b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 2e19f7e705cc5b0339a2b5d6e25946b2
SHA1 8e0301a93750f0c687c49a658baa389ef7b4db2e
SHA256 d4722be60954af8eb3c4f5544db85bc01f3264f8ddb6732839790d9fe369c957
SHA512 60a16a1d479470ebe6df9dbac7172a98974308a1086dbb1f02ecf71f25d620c745d3b13a4a687a4205da592014650f0571784b1535142cf3d9cacada0dc76466

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 9453d22d8fcfa6304980f10d6965c0bf
SHA1 eb25968c3f359866e7687709564f34e4cd31da78
SHA256 6c51e22725605dd64f081ae7802e1593f5df978990aab90b9f47c0ac10d49874
SHA512 10b393334f8b3692324dfb25a7c16e77e3e07d556ff636428a9462f0e3ded446f313ee9733fe21903f28d471df2229eca474c64728b4eed85f9589e7ca480759

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 7c6001c85ee4586ef209265c506b1faf
SHA1 0418c6636791f1e1921f3af85e0e1fafec244b43
SHA256 31f108d03df3035aed08004e7131cf27cc748fcccc237f34fa81d44a5891cac1
SHA512 48429252b91f62d22fb98e6f8f198f86edd7599958ebb1d5c5449ad31e642ce99996666d8dfdd5579cc7eed112c1e372c4b0760eb07e359f28ca911c093dc450

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 256038004b637b753bb1e50648a0bc65
SHA1 b06f43162d72465f799df7d3fd30a55319f73bab
SHA256 fd52bd21320ef635001560abdbb320e6bafcab44763a7f636e663a3e3cb458d6
SHA512 ba210af850de571f654d7d0a2337908ece0321fc31557cdc7f983064c1f90648769abd0d3c4c28d4420b611718f325fa5439e3cf81b42b059cfee9a0a5dd8c86

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 e33bb6493daa19fbfc99939b8bcbeb43
SHA1 dacce22795a133567c6f879125318e44b9eef336
SHA256 3e671b2ae87d0228599d6847125114e7aa946a4dbf6dfeb29bd1cac302c11171
SHA512 34afd33206066da8917fe42be06094c9571cbfe0b732ec1d8e9b6e99f55aa0facd28aa4af4f66ed01aa902adc7aae93cfa1e795af11d0d5a775ebf27cd20b015

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 784b43c8283b4c3757cd5712bbcd5b92
SHA1 e24539dc54f96ad2783550ef1b1c86c1782b29d2
SHA256 22c22beeeba8fe12405f1e0dd0261129dd30f6d882c48e13be505a7a9bc2716c
SHA512 3d9ff26d3770ba30a1b62ab91b3be638ccd88383fbc117b4251697240af2a99053e245b4e2d5fb84b00e6885b735fe2304df64435adf4a605693fe153e1f9315

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 6cd4bf9133d5fc6004c7212cf7937ccb
SHA1 65563fae244108faa9348ac9a4bf16e24445c2c4
SHA256 59d824a45f8e730d355204d4ff8ee623c00c686bec314fa56e0758687bdabcf3
SHA512 6b90fafe315995842b591b74b33bc151c40b614a4591f63b894503496b9c3f763e2cde852f8168c8200aee92bd2b7e3a9ed8d4450364d8bc1654fecf85f5d475

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 2b4ec2eac2960c9fd5929bada70b1a51
SHA1 f124c54ac8b8c0a884413f43b7d8c690a0c474d9
SHA256 2f44ac1cd58a8caae225779c6cbb17daa0411d0e4f92bc56bfa59c62f1b62fe8
SHA512 af2186bda3687edf9bbc9b48ea7ac3aec30e43a413e00218274021a6167742928ff2f474a8572e9cd3db77f9c1525348c019e3d946099541e2b9d35edf61dc83

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 5594946899de8c268c05db90ba8dc9e6
SHA1 317fe1a28e1b29c7a1f4a7c0c8237da1a09fe3ab
SHA256 771646c068cb172531273a9d87c01063050c8f7b91ae4a621282863732043ace
SHA512 7b34ce4812092b4db580fd6991a48979ea4598cf2d39fa46815fe7c51df5946639494c7c8681fc9b69903c94c6ca2793ca43080c3e8ce0a4fbc28405bf85cd28

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 0a24e8c16d014a152b35ea13ef53d35c
SHA1 3734d0deb9af5277dcc6535c69e667ac83f0561f
SHA256 d27fd6497c5b742db759f91e7f5650fa219fe2cfb982422c60d9de7b7be15149
SHA512 dd4ce201069e78a12db731de8290111707d9a5efeea6c355ed558f68750e326a5abc36ec556db344f5ecd4e7f9ba4924f638442b9e4d694c644780b6bd3a32b8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 4ef50d5138eef81597960ab407ea7b9b
SHA1 cc7cf8efc0a89754a29667a24c1531946791d715
SHA256 e019d85cd83d1f5960d8d8ed759e97129ffc8dca2f6991cde6a321935540062c
SHA512 e2b003af7eb69332b804c994587235db3504df1ff5ca00cbc3eb306e9fd061158c0b42a420773927cf301d54901e7e81aef0fb1455c645c4b7c81ca31ec1a0cc

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 46cc887ce20321a16c0525c8cf832e00
SHA1 9d463466fa6011fe1bd1d6a669c09620908b7f4b
SHA256 83e64429f2841f97457155f9fd74d15849b62c4496084276a971476bdbe4d542
SHA512 3e6b01beddf7bfcddad3a0bdb74bb9f6fa682f577e1d3f6232787f281c61cb0ced928376ed23c16725f35351e154ad8cbe80a7d8e7d3c874274b7a2bef52ee77

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f09cfe54587b2f9a990ba338cbc4f1bf
SHA1 7053a5897b1741f79dfc0a7548fcd7ae9c8cea63
SHA256 a7c7d90624bb440d1db1ffce30f6b48eac6db3ddbf1edb7639f91fd7347f7833
SHA512 a14406c5abaaa30b716dbda56acc4a017d4a04564c118e0237ce429228df43df5d327f7fc9960246bdfaad43f94eda5a38f9909e8b602be474afca607b5d4636

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 5dad40fd4da14c2c023161c77a71a9a0
SHA1 c2cc78c32a995f0a32ad23dba3e0c760e96052fc
SHA256 f6351f44a7d46f4d049a16af5dd58c67b60cd2f7179c07d5f7d634b76b9cd4cd
SHA512 e65b76cbaa76dbc0e63dad68a34a64d8f89bd0ef080fcd4e9226b08d2cbfcf67304c533300e0040fd75296d25890b88dfb1c36120e41b4cc005c5a11dab46004

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8bce4d9c9161f8b92634b2d960dc898d
SHA1 b655d23f8ad277876dc0ac72504f3f6d778208ee
SHA256 04fb33bbc54b4e323688af1f55dedd8a8875295e938432d9b320f995d475f1fd
SHA512 5057367b828786d09754eea6bee8fcce149b2403878d90c49ba91f8807d9d775e7ec82c5cfaf3b922e10ca5aa4901757938badeda4007cc82b8a2e1eb14a0dea

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 cddce490c9e09e8235a7c13c20f880bd
SHA1 afec03124bfab1da6bc5ab3635559651c00a048e
SHA256 ba9f14199a0d7e0e0501dcef3f0169d2be89dbcd048cfaad0cdcab0dcac23de3
SHA512 a623ce1ddcd00534e65726c7d6aa98121558bcaedbf3ac5021abe100f61d977ac16f13ab2ad401faf17f69ea5bd2f7459d1cee38dc9174db8236bc0cb2c0ecb4

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f6846609d56e22fe2a4d6c630ccfd248
SHA1 d7ea2c6b8a317c6cba9c477f6c2115fc19fff3fc
SHA256 450b364fd0e9225e1c83f57a3e9cb8fce013537c660d50db83ab7a75821a101d
SHA512 5b115cb5453cea8fed4444b606bc47c2874c703a946fbcbcfc5c748095be61f9dc6c83c938ed1f412c896735f25b91fd3a3b3e0e6ecf1c79efeb7cfbed8e98df

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 4ff66c67503ca7ab6cb85c8441a725fc
SHA1 208bb25afbe1e109f0b401b46a39860153b89733
SHA256 5543ce716704165d6067589f6a49ac7df5e62c95b41bb4334a6212c56f539bc3
SHA512 690bccfa9b0fac63289b9f0ca850a880d1be415ed141bcb354f2687fa0443e848a0ae78d164536c8fba8ca6ab337efebb0c343383541a91e67d93dbea6837a35

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 54a3aa1fee0742a1a454c20d5561e245
SHA1 4f93f875d6790ff7f1093d9ebfc006720d1d3fa8
SHA256 865fa04d2f6f51b1500829c4634cca415c60d7cf0471590c196ed260094eaadb
SHA512 5c59a6aab6d4a143ca7b4078bbf8e4532ce1ff70890899d62172d1141214aa4cc43fdd2f64eb0a3cc3e0a1ef1f85047b95fe877439feb1e8fd83b23016ea7846

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c0f78d9e571f955c7f62f167cead4d9c
SHA1 b17a97458bb033de45507bb0ca9676ef36fc3709
SHA256 e562933216341eef53f03ab6c02149a4c52df0e7bcdd160236b9c8c113f98c3b
SHA512 ed7ce1b695751c83e109d862c63c5347fdce918d47940ed102ce9493d6fcb586d89870a157e50d3a7ee5dd393901a4d4fc49923baf3f16a1ed990aeeab1cc5aa

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 319bfd183926939aa40738a4d699aca3
SHA1 13c71ce52ac9dd50b8e591c6dca1e064e5fcaf33
SHA256 99406aa98223e11f716092e7603b1a76bd1e031086aa457ba0d263df755434c4
SHA512 1d5dc7c68377eae5993648c979bf714b20b56f810366c17990d89d3fc2b0c2d28dd896abad57ee6d1f7e7328160775aee9d69db3c24eac5a5c715664d61d074f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\48ed2c31-c779-4714-a8f3-12027cd31035.tmp

MD5 f789a60d03f13d234231bdd6406026d8
SHA1 1cc98c6c5842b1d372645e74a88eeb37b67416b7
SHA256 13f6b55612e0afa28da2acd1af6d2d70f2433b6626551b81fdcc56a3affe4363
SHA512 f4aff7b0b38025e8be569d632ad771820d26e4e7581bece0388a4dccba274267112ad106b0c0b9f217537128ce450d98f39501c440550e465831fafb09cb6741

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 7fe59851b67adbe55ba236f72763979a
SHA1 e44ba3129d39de98df4ecfa8ea037ab40e2d7235
SHA256 6feac6676e74e2008657f3bfb59b96cea10fad00585530001d2fbfe19d193167
SHA512 c75308f96848d159e39658ee34e933596c6fb91f644ec93f8c345e28e89d0d5b84b267f3a30d5089d80a1a0931c4d7d420e04738cc8200dabaf8d055cd928aed

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 03c9b50f9c9b95c05358fdce3556471a
SHA1 f8f2eb82cc8cf376dd1a249fe35e4db28b2f8194
SHA256 3864308b8065f4d16d4979d38705301afeeefa78324ce20d39860442cffd21bf
SHA512 1be46340d0f993ba04bbe6b822c7a306883405082ebef7a3854d153fe9e0af35a9bb967e1268265b2132d820c8bb4297f148318371212c11ddc81d2d780059a8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8f5da65be80b39dafe7f47d9a9fe5a81
SHA1 76219d1c94ddf1b49fdcc304bab1c76b0dde50fd
SHA256 a596fa0461ba49eab8388cadc7959f311c9307e9946817d3c8db87fca14e2fb9
SHA512 371b8749c235ed793a793b29da919bbf71996c38ac7a4ed18dfb0b9381a052672abaf16fe895a0c9db04d133dfffc99815e3fa1fa9f0ff31a9a502f89114f6f3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 01a8d39c24757ef9abf3373240a77b19
SHA1 bc4594e3de96f33f60058c74a0fcf1659658cb74
SHA256 f013e3400db1d5563ac8b526c72412f28e778aea1896b9f90ddb037782df7fcd
SHA512 f1f56404e747322fa8a0cfafaa2763433bb27bd36188e9730d7c418d599dee44e166422b3dd6247a46aabfef1d8803d2efbdf223007d75bfe2576e6a045d53fe

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 12f477b3f350cefd68e0b14326abb843
SHA1 bdac7031f2c5389b42586198b8de30a52ae961f3
SHA256 672fbd27d71850cdcd8cfb49b9965d016d9fff386872b484e67530f7fd3a29ca
SHA512 6d08c94d3b164ce520ad79928852a703f005a7b15f0f70ceab0ce169601ffeaa041215b0c3a74a7f4b7e10d759a2e7c8c3881e3daeb26310d71ab8cd29915ece

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 bf15f6267e2ed1c67c721482ed6818f0
SHA1 42d348f6f9831cc8567e2ef86d4a6dc632b0c6d9
SHA256 14519e14a86d5a52aaf4ad82a0de73fa9b7c26f19248ec582a10bcf1d931ccfa
SHA512 2a6f2c916c79011cb43452852b83bae57978ee9f876d2f04efd9be369a314e5e5d60eda83ebf2098f91fc1ed20163e4ba0ee23dd244831c9b7a23dbf376b0b7e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\375cf73f-2663-4837-9234-60f6d26e4f27.tmp

MD5 42b78e6f29153841bad0e5a0b9c105b0
SHA1 e3214c8cc46ba591136ea98539a00a50853efd34
SHA256 261c51f899f8293b7b11674d269506d8c0596707ce9c1473e8938f3e3e3a4b5a
SHA512 115bdb48786a70b23b6241c4601b30d190654c5e5709a58730a5f98bfc42ee67e494458d3e9f4e980bb33c99c2d42814fa3940ecd904e47bcd105caa9a21e375

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 addcaea7e368626b15c7e5679860d9a2
SHA1 606afc709a1fa9c6378934916f45ff13a305523d
SHA256 36e20e3e9cca53ade6d0655a6acc0c7f3be2924608d17cfd1139a0b2f02442b6
SHA512 fb52c05b0968c8c4f7ed9d3fb156108b4becb30a2894279e4a051d006a176154221a1978d3310fea54e9b7e83e088b5bfd841eb325a99be7aa40ed132bbabee8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 02b7131733032123760b077005b76fba
SHA1 0d55cfc622a8be8febc051f9ca5ca0748c4ccef1
SHA256 2c1211e203d8f22c4bc7f6ab5224dabb4cdaa4586d0f7dbd56dbf58a17daa43d
SHA512 b34eddf1147cdaed6bb80dc20d9d506df35445b99f2107b564b37c1a0f8698e5572e23a5d988819c7ed06fc2141634f852354c01f5657cc0d6c275ca65982c4a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 041be6815bd1d3f3cee5a5e5d2f701f1
SHA1 316066531e62d1e3b6563ce56604ab79bd5ad299
SHA256 6402bd09561baf5340e785ddbe7948cd5adaef45b10ec1293c4d72613d5026dd
SHA512 d45e5cc9c6faead9b1164f58f0cf8f2c384b3ff955fc85847560d07ca5c376bc63a09040388f148693e68a1ffa94422f0f00bff5f3942fc9a4b9a4730f4eb2c2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c97fdd0f1a034f161a5bed99889e3958
SHA1 64cac650cff5e045d1acbde824089e3b28fe6dfe
SHA256 ac6d0178c7813bfe9d46d38d3c9f2d36962900e6acb8f8328a6f7cce6ab32ca0
SHA512 ac48172b265333ec4e1835dbe1970e68170e901cbd38c621aef42ed271f2a553b2c923f1639585ef81ebf0aa5f41deeda2b64095bcbd239fc07a605ccd48512a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 000b7dd356fda7ded222b7994590775a
SHA1 9af3f370ef5a1291a4949222a749e2d43a9ab912
SHA256 a76a67525752093ed2a52a7473c5d71b4fb703aaec1a424fd2fa213d3e2b9962
SHA512 0b6780ffbf57ba462b0c45b389664a8b92dee911a51848a4e94ebf42b577f4108ba6f40f513a23240cd810a4ec4a165e9e761b9f87cbd2c6e6850cac7015bb2f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 60f965f60183635405ba46b61a19a694
SHA1 d842acab1acf5015232e87fef9132e3ba2fbba5e
SHA256 595977b9bbadcf296db611e5c03fd2b236fe738f3ccc2b651ee9870db60369c6
SHA512 787a3668acbde645fa0d0c94fd6f9b14c6409dadec08f8c347ea3a1a56718c5a5232c945d7e95952bb566520461c359f4456ddd54e9b510697ca07d8d9655f3c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1c5b45603147c6246803726370cd08f8
SHA1 6369daee3a9995e8983c7f0e316522b14e71c202
SHA256 3cb1538ac082d712de667feb9ee07efaa3d62d7519fa882341750ac5dec166dd
SHA512 8117431de9410ce7dde75421da6a5e54994642b6b44b954549d08dcdca91fe7dc209925c93e22cff69fd6b9f748b00e77d1a014acf3841ae3a1b54393b83a9a3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 a9f8dbd55eb5716843b697a2457e547d
SHA1 7fbfd2dbc6ac15a18870288636b41213eae6522c
SHA256 9095efe0f5c810dd431294018102a0f37f3b3e5f80d0c338bb28a446700b8980
SHA512 eee81d3f60b0d6cc4bdd1b8308df92b64c399c107ebc35474314e6869ffca150e03946b3b5ea0a47ca9641cdfe4111cab6fa89bca73cad36203f63994eb5023d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 819fc28991cb08a7789fc317ede31226
SHA1 b2c9a8111545fe9aec91cc043529887fae1ffdcd
SHA256 95b7987f7c28787d91c8d4b5ef29dac6663355dd7ce486ec306e41bc1a979209
SHA512 d2deb9df7df83ff85fa9cf94f0d7a287df89c9cd25f63ccf2684602a020b0edafe8a1bed41d90327156aa80b02a7afa736295ebc9ff7e055c4ac24ccea3d9f5f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 4aa807141d2e50013ef73e1f2e039f42
SHA1 0e6dddb917480750a288b8d2976175c61a85d6a4
SHA256 6cd76afa1c7d3710ed370364f6892425e0e513fea35f1ba4cc43ac350ef1b623
SHA512 00afc0f44bdd511d1904abd9d4489d72ad269099acd8767cbd1850e978d715ac352195691773892cfb5f9ad50d425e3e6565e55222cbaa1546c55e6902e9e8c3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 aa3a35b5ce3746b8ab802991ecb1caab
SHA1 b38636b3153cc3e68b3095a73a9708feafe0ceca
SHA256 531f4985eefaaf049ea40a6fa9b9d018f7fb51fbdeedf2172a7429df60e74466
SHA512 a0b4b19a4fc8b50da6c85530dc74510b03f405c06a420b3222ab7f13b4746e22d00736704eff9563a3dc8d77eca8aca3fc283c15fa86ce0845fceae1bdd6da4a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 d410aae1b67a9619e9f4ada13b4287b3
SHA1 c69308e49a68aa65a55c078b261ffdbff5139d11
SHA256 090398f1c88f6213ba102d19b112c0e45b1744a6bd4f572fea1dd1d6b01d42af
SHA512 9837dc1bada9667f57ff93cfcb2d2ad66c3e2e41a76739d0b9a115385708ad4d872faf9fbf59bd6bacf7c72d74bf2313473391f9276dc5813f3cd282c4b49849

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 552a4813ed2db59886729527fa2cdcef
SHA1 118dd4bdd53201c0796ee74e2395a8501e27faff
SHA256 7e4fc696de654fd261316cb74d734bd8c869ce86f2defad8a5f764f10736b981
SHA512 e4bf24a00b894c0122db3e17f1747c7ce9df1e5e4478d133cfcb2f71edcab4e207cd8cb9757f6220798012eb4617d4cafeedf8077437cba8dfc764e00061e3cf

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 a70a4c3d11a55b19f9dbfb21010456fc
SHA1 6a79d0391190bfe3db9b9dce469e8453e56cda9c
SHA256 4b4df3613de2ccd5aa78b66a35bbae5361ee31940dd993c90d12958bc1a23ed4
SHA512 b481b8d879396be498a274b879dd5b668d4ebf5f4c9c58b2df2b9c44798899b2d209a30afa2ee9e9a427b2a9174973ed6491f15fedd55eed203bb49ea7506094

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f06448f98c1dd254eb2952f04061f9e1
SHA1 109dd60732c5e1a119206ac7b4e6feda9539afd0
SHA256 f9819ab9a3fdbe526d7c2445a044cff5ef1e359f103e5af4b18d17b02252891a
SHA512 4e5316c998ed6d03ffdce5594feb55479de4528e6d45b41f11b3a82ffb4fe9a53d7e0a3d073ddbbcfd607ceb75fc9b2a4a8248512c1410d6b0bd2ac8da48ae0c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 e602b53c8364ceb47f3b33b1c81a8a3b
SHA1 b0604223a3485e4ef8e3de7d7dead68870e9f7c2
SHA256 c709dd5ec80c715d5d9eba1a5d167c11db5aaa4c50bfcd706b2675427386d6e0
SHA512 9b6b95a420b6f4c896f511c1c58da2daa13b09e5e34432e26cb964a200c0744e225fa6442d6fb55d3b70337ad6d6c126b47c7bf17981146ca7c5764b5d40ae01

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c4a142c2621bde1e80c20768c3a3e1d2
SHA1 799fe3ed9e156e7ad56d22e223a259da3b53df0b
SHA256 831ba45e10f3682781c915afe737d5c7c247187d21753c676dac625548c8d085
SHA512 4d4ae92030c8904ea6de013e48636a71f612eea0ce76017b559ca7aafe040d87a4d38d7d14f16725633ea09968dc877674ea82947e3847a32553ae184b339410

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f589a9bf4ffa918199729e2d15be9360
SHA1 a90749b747336de5f16ca56c139141039cad073b
SHA256 bec10a7ba8e83d29cd76354e5e5f6eb13309146cdfbadd4e780266ec9cd54d2a
SHA512 86e5eb43d437655aae74a51383795a7d4afcd1c740b8f05ec174a39f3144ee607471de5af1526f535fbcaf3964371787e68674a09f221c5fe4fa146ca0b2f14d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 a76b2d29861c7306428d25a4d938f57d
SHA1 efb3a4f093952683c408e0bf460d29a49ff2eba8
SHA256 e97bc223b2b3b949470d068e839ce14f84f6749406bb2c483c3d6a4480e4fa92
SHA512 cd2411d2a077a789e9c4433238300bf9c1391a1795e7c5442db0bd187fb33dfa19825da6cae03e5bd463b5bad733e56b2f1554ebe9d57afbfe80ae4683905ce8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 7a6f5e353a33ff76e21c336565467069
SHA1 8873bed0f25c16c11b625b305a4e8f643cb771d1
SHA256 09907fb051a4c6c6b1f13110fc7a3b60a48991088a48ba7915396c39d7b3a2d2
SHA512 001ef5afd9dedd45f562d5d264edd177772615e4dc38dcf078f02d318ff5eed483fc8069ffd75ac1ca5de5b5317cd008b190e24a15e2c03f2346d1e996416628

Analysis: behavioral6

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1694s

Max time network

1153s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libgmp-3.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2792 wrote to memory of 4332 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2792 wrote to memory of 4332 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2792 wrote to memory of 4332 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libgmp-3.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libgmp-3.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4332 -ip 4332

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 600

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 72.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 69.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 224.162.46.104.in-addr.arpa udp

Files

memory/4332-0-0x0000000068C80000-0x0000000068CEF000-memory.dmp

Analysis: behavioral8

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1364s

Max time network

1153s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libisl-10.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3304 wrote to memory of 4884 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3304 wrote to memory of 4884 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3304 wrote to memory of 4884 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libisl-10.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libisl-10.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4884 -ip 4884

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 608

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 200.79.70.13.in-addr.arpa udp

Files

memory/4884-1-0x0000000068C80000-0x0000000068CEF000-memory.dmp

memory/4884-0-0x000000006A780000-0x000000006A86A000-memory.dmp

Analysis: behavioral15

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1371s

Max time network

1161s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-log.o

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-log.o

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 200.79.70.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1359s

Max time network

1146s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpc-2.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4800 wrote to memory of 632 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4800 wrote to memory of 632 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4800 wrote to memory of 632 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpc-2.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpc-2.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 632 -ip 632

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 604

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 66.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 5.173.189.20.in-addr.arpa udp

Files

memory/632-2-0x0000000068C80000-0x0000000068CEF000-memory.dmp

memory/632-1-0x000000006FE80000-0x000000006FED7000-memory.dmp

memory/632-0-0x0000000065600000-0x0000000065619000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1373s

Max time network

1155s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpfr-1.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 888 wrote to memory of 2344 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 888 wrote to memory of 2344 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 888 wrote to memory of 2344 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpfr-1.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\libmpfr-1.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2344 -ip 2344

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 604

Network

Country Destination Domain Proto
US 8.8.8.8:53 udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 69.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

memory/2344-1-0x0000000068C80000-0x0000000068CEF000-memory.dmp

memory/2344-0-0x000000006FE80000-0x000000006FED7000-memory.dmp

Analysis: behavioral11

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1366s

Max time network

1158s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\include\winapi\mshtml.js

Signatures

Command and Scripting Interpreter: JavaScript

execution

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\include\winapi\mshtml.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 67.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 101.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1709s

Max time network

1147s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-exe.o

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\lib\bt-exe.o

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 104.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 66.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 138.201.86.20.in-addr.arpa udp
US 8.8.8.8:53 69.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 26.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral16

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1756s

Max time network

1142s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\libtcc.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\tinycc\libtcc.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 69.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

memory/3248-0-0x00007FF9EB250000-0x00007FF9EB2B5000-memory.dmp

Analysis: behavioral4

Detonation Overview

Submitted

2024-10-27 13:36

Reported

2024-10-27 14:07

Platform

win10v2004-20241007-en

Max time kernel

1790s

Max time network

1139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe"

Signatures

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe

"C:\Users\Admin\AppData\Local\Temp\x54uwn3pph\Compilers\MinGW64\libexec\gcc\x86_64-w64-mingw32\4.9.2\cc1.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 107.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 11.179.89.13.in-addr.arpa udp

Files

memory/2952-0-0x0000000000401000-0x0000000000DAC000-memory.dmp

memory/2952-5-0x0000000065600000-0x0000000065619000-memory.dmp

memory/2952-6-0x000000006A780000-0x000000006A86A000-memory.dmp

memory/2952-1-0x0000000000400000-0x0000000001149000-memory.dmp

memory/2952-7-0x000000006FE80000-0x000000006FED7000-memory.dmp

memory/2952-4-0x0000000068C80000-0x0000000068CEF000-memory.dmp

memory/2952-3-0x0000000066200000-0x00000000662EB000-memory.dmp

memory/2952-2-0x0000000070F00000-0x0000000070F24000-memory.dmp